The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads.
Exploitation Status:
Versa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.
Workarounds or Mitigation:
There are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions.
References
Configurations
No configuration.
History
23 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 | |
Summary |
|
19 Jun 2025, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-19 00:15
Updated : 2025-06-23 20:16
NVD link : CVE-2025-23169
Mitre link : CVE-2025-23169
CVE.ORG link : CVE-2025-23169
JSON object : View
Products Affected
No product.
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')