CVE-2025-40904 PUBLISHED

HTML injection in Smart Polling in Guardian/CMC before 26.1.0

Assigner: Nozomi
Reserved: 16.04.2025 Published: 19.05.2026 Updated: 19.05.2026

A Stored HTML Injection vulnerability was discovered in the Smart Polling functionality due to improper validation of an input parameter. An authenticated user with limited privileges can push malicious remote strategies containing HTML tags through the sync. When a victim views the affected remote strategy in the Smart Polling functionality, the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
CVSS Score: 5.1

Product Status

Vendor Nozomi Networks
Product Guardian
Versions Default: unaffected
  • affected from 0 to 26.1.0 (excl.)
Vendor Nozomi Networks
Product CMC
Versions Default: unaffected
  • affected from 0 to 26.1.0 (excl.)

Workarounds

Review all enabled sensors and disallow or delete untrusted ones.

Solutions

Upgrade to v26.1.0 or later.

Credits

  • This issue was found by Stefano Libero and Andrea Palanca of Nozomi Networks Product Security team during an internal investigation. finder

References

Problem Types

  • CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') CWE

Impacts

  • CAPEC-592 Stored XSS