The content of a SVG file, received as input
in Centreon web, was not properly checked. Allows Reflected XSS.
A user with elevated privileges can inject JS script by altering the content of a SVG media, during the submit request.
This issue affects web: from 24.10.0 before 24.10.5, from 24.04.0 before 24.04.11, from 23.10.0 before 23.10.22, from 23.04.0 before 23.04.27, from 22.10.0 before 22.10.29.
References
| Link | Resource |
|---|---|
| https://github.com/centreon/centreon/releases | Release Notes |
| https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-55575-centreon-web-high-severity-4434 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-05-13 10:15
Updated : 2025-10-22 14:12
NVD link : CVE-2025-4648
Mitre link : CVE-2025-4648
CVE.ORG link : CVE-2025-4648
JSON object : View
Products Affected
centreon
- centreon_web
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
