CVE-2025-56537
Stored XSS in OpenNebula Virtual Network Template
Publication date: 2026-04-29
Last updated on: 2026-04-30
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opennebula | opennebula | to 7.0.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stored cross-site scripting (XSS) issue found in OpenNebula version 6.10.0.1. It allows attackers to inject malicious web scripts or HTML code by inserting a specially crafted payload into the virtual network template parameter. This malicious code is then stored and can be executed when viewed by other users.
How can this vulnerability impact me? :
The impact of this vulnerability includes the potential execution of arbitrary scripts in the context of the affected web application. This can lead to unauthorized actions such as stealing user credentials, session hijacking, defacement of the web interface, or spreading malware to other users who access the affected pages.
Can you explain this vulnerability to me?
The CVE-2025-56537 vulnerability is a stored cross-site scripting (XSS) issue affecting OpenNebula versions prior to 7.0.
It exists in the opennebula-sunstone component, specifically within the virtual network template parameter.
An attacker can exploit this vulnerability by injecting a crafted malicious payload, such as a script, which executes arbitrary web scripts or HTML code when rendered in a victim's browser.
This allows the attacker to run arbitrary JavaScript code, potentially compromising the security of users interacting with the affected interface.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to execute arbitrary scripts in your web interface, potentially leading to unauthorized actions or data theft.
Since the vulnerability is a stored XSS, malicious code can persist in the system and affect multiple users who access the compromised virtual network template.
The CVSS score of 6.1 indicates a medium severity, with the potential for attackers to impact confidentiality and integrity of data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves injection of malicious payloads into the virtual network template parameter in OpenNebula versions prior to 7.0. Detection can involve inspecting the virtual network templates for suspicious or crafted payloads such as <image src =q onerror=prompt(8)> that could trigger script execution.
Specific commands are not provided in the resources, but detection would typically involve querying or exporting the virtual network templates from OpenNebula and searching for suspicious script tags or event handlers within those templates.
What immediate steps should I take to mitigate this vulnerability?
The primary and recommended mitigation step is to upgrade OpenNebula to version 7.0 or later, where this stored cross-site scripting vulnerability has been fixed.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The CVE-2025-56537 vulnerability is a stored cross-site scripting (XSS) issue that allows attackers to execute arbitrary web scripts or HTML via injection into the virtual network template parameter in OpenNebula versions prior to 7.0.
Such vulnerabilities can potentially lead to unauthorized access to sensitive information or manipulation of user sessions, which may impact compliance with data protection regulations like GDPR or HIPAA that require safeguarding personal and sensitive data against unauthorized access or breaches.
Mitigating this vulnerability by upgrading to OpenNebula version 7.0 or later is essential to maintain compliance and reduce the risk of exploitation that could lead to data breaches or unauthorized data exposure.