CVE-2025-40902 PUBLISHED

HTML injection in Users in Guardian/CMC before 26.1.0

Assigner: Nozomi
Reserved: 16.04.2025 Published: 19.05.2026 Updated: 19.05.2026

A Stored HTML Injection vulnerability was discovered in the Users functionality due to improper validation of an input parameter. An authenticated user with administrative privileges can create a malicious user whose username contains HTML tags. When a victim attempts to delete a group containing the affected user, the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
CVSS Score: 4.8

Product Status

Vendor Nozomi Networks
Product Guardian
Versions Default: unaffected
  • affected from 0 to 26.1.0 (excl.)
Vendor Nozomi Networks
Product CMC
Versions Default: unaffected
  • affected from 0 to 26.1.0 (excl.)

Workarounds

Review usernames of existing users.

Solutions

Upgrade to v26.1.0 or later.

Credits

  • This issue was found by Stefano Libero and Andrea Palanca of Nozomi Networks Product Security team during an internal investigation. finder

References

Problem Types

  • CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') CWE

Impacts

  • CAPEC-592 Stored XSS