CVE-2025-23169 (GCVE-0-2025-23169)
Vulnerability from cvelistv5 – Published: 2025-06-18 23:30 – Updated: 2025-06-23 16:05
VLAI?
Summary
The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads.
Exploitation Status:
Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.
Workarounds or Mitigation:
There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-23169",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-23T15:45:57.350783Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-23T16:05:37.227Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Director",
"vendor": "Versa",
"versions": [
{
"lessThanOrEqual": "21.2.2",
"status": "affected",
"version": "21.2.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "21.2.3",
"status": "affected",
"version": "21.2.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "22.1.1",
"status": "affected",
"version": "22.1.1",
"versionType": "semver"
},
{
"lessThanOrEqual": "22.1.2",
"status": "affected",
"version": "22.1.2",
"versionType": "semver"
},
{
"lessThanOrEqual": "22.1.3",
"status": "affected",
"version": "22.1.3",
"versionType": "semver"
},
{
"lessThanOrEqual": "22.1.4",
"status": "affected",
"version": "22.1.4",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-18T23:30:49.907Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2"
},
{
"url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2025-23169",
"datePublished": "2025-06-18T23:30:49.907Z",
"dateReserved": "2025-01-12T01:00:00.649Z",
"dateUpdated": "2025-06-23T16:05:37.227Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-23169\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2025-06-19T00:15:21.497\",\"lastModified\":\"2025-06-23T20:16:59.783\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \\r\\n\\r\\nExploitation Status: \\r\\n\\r\\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \\r\\n\\r\\nWorkarounds or Mitigation: \\r\\n\\r\\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.\"},{\"lang\":\"es\",\"value\":\"La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite personalizar la interfaz de usuario, incluyendo el encabezado, el pie de p\u00e1gina y el logotipo. Sin embargo, la informaci\u00f3n proporcionada para estas personalizaciones no se valida ni se depura adecuadamente, lo que permite que un usuario malintencionado inyecte y almacene cargas \u00fatiles de Cross-site Scripting (XSS). Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para desactivar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"support@hackerone.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"references\":[{\"url\":\"https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4\",\"source\":\"support@hackerone.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-23169\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-23T15:45:57.350783Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-23T15:45:58.426Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N\"}}], \"affected\": [{\"vendor\": \"Versa\", \"product\": \"Director\", \"versions\": [{\"status\": \"affected\", \"version\": \"21.2.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"21.2.2\"}, {\"status\": \"affected\", \"version\": \"21.2.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"21.2.3\"}, {\"status\": \"affected\", \"version\": \"22.1.1\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"22.1.1\"}, {\"status\": \"affected\", \"version\": \"22.1.2\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"22.1.2\"}, {\"status\": \"affected\", \"version\": \"22.1.3\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"22.1.3\"}, {\"status\": \"affected\", \"version\": \"22.1.4\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"22.1.4\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716\"}, {\"url\": \"https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4\"}, {\"url\": \"https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3\"}, {\"url\": \"https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2\"}, {\"url\": \"https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \\r\\n\\r\\nExploitation Status: \\r\\n\\r\\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \\r\\n\\r\\nWorkarounds or Mitigation: \\r\\n\\r\\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2025-06-18T23:30:49.907Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-23169\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-23T16:05:37.227Z\", \"dateReserved\": \"2025-01-12T01:00:00.649Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2025-06-18T23:30:49.907Z\", \"assignerShortName\": \"hackerone\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…