Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

VMware NSX XSS Vulnerability Allows Attackers to Inject Malicious Code

Posted on June 5, 2025June 5, 2025 By CWS

A number of Cross-Website Scripting (XSS) vulnerabilities within the VMware NSX community virtualization platform may permit malicious actors to inject and execute dangerous code. 

The safety bulletin printed on June 4, 2025, particulars three distinct vulnerabilities affecting VMware NSX Supervisor UI, gateway firewall, and router port parts, with CVSS base scores starting from 5.9 to 7.5.

CVE-2025-22243: Saved XSS Vulnerability in NSX Supervisor UI

The CVE-2025-22243 vulnerability represents a crucial saved Cross-Website Scripting (XSS) flaw in VMware NSX Supervisor’s consumer interface (UI), scoring a CVSSv3 base rating of seven.5 (Vital severity). 

The difficulty stems from improper enter validation in community configuration fields, permitting persistent injection of malicious JavaScript payloads. 

This vulnerability impacts all VMware NSX variations 4.0.x via 4.2.x, in addition to dependent platforms like VMware Cloud Basis and Telco Cloud Infrastructure.

An attacker with administrative privileges to switch community settings may embed malicious scripts in fields resembling DNS names or IP deal with descriptions. 

These payloads execute mechanically when reputable directors view the compromised configurations via the NSX Supervisor UI. 

The assault leverages the privilege escalation threat inherent in administration interfaces, because the injected code operates inside the sufferer’s session context, doubtlessly enabling credential theft or lateral motion.

CVE-2025-22244: Saved XSS in Gateway Firewall Response Pages

CVE-2025-22244 impacts NSX’s gateway firewall URL filtering element, carrying a CVSSv3 rating of 6.9 (Reasonable severity). 

The vulnerability permits malicious actors to inject scripts into customized response pages proven when customers try and entry blocked web sites. This impacts NSX 4.0.x–4.2.x and dependent cloud platforms.

Attackers with gateway firewall configuration privileges can modify HTML templates for block pages to incorporate <script> tags or event-handler attributes. 

When customers encounter these pages, their browsers execute the embedded code within the context of the NSX UI area, enabling session hijacking or phishing assaults.

CVE-2025-22245: Saved XSS in Router Port Configurations

The CVE-2025-22245 vulnerability (CVSSv3: 5.9, Reasonable) resides in NSX’s router port administration interface. 

Improper sanitization of port description fields permits script injection, affecting NSX 4.0.x–4.2.x deployments and built-in cloud platforms. Malicious actors with router port modification rights can insert JavaScript into description metadata. 

The payload triggers when different customers view or edit the compromised port configurations, doubtlessly intercepting community site visitors knowledge or altering routing tables. All three vulnerabilities share widespread root causes in insufficient enter sanitization and privileged entry necessities.

Patches Obtainable 

VMware has launched complete patches addressing all three vulnerabilities throughout affected product strains. 

For VMware NSX deployments, customers ought to instantly improve to model 4.2.2.1 for 4.2.x installations, 4.2.1.4 for 4.2.1.x variations, or 4.1.2.6 for each 4.1.x and 4.0.x deployments. 

Notably, VMware has discontinued assist for 4.0.x variations, recommending migration to the 4.1.2.6 patch launch. VMware Cloud Basis environments require asynchronous patching to the corresponding NSX variations.

The patching course of varies by Cloud Basis model, with 5.2.x requiring NSX 4.2.2.1 and earlier variations requiring NSX 4.1.2.6.

VMware has confirmed that no workarounds exist for these vulnerabilities, making quick patching the one efficient mitigation technique. 

Organizations ought to prioritize these updates, given the potential for privilege escalation and the persistent nature of saved cross-site scripting (XSS) assaults in community administration interfaces.

Pace up and enrich menace investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Attackers, Code, Inject, Malicious, NSX, VMware, Vulnerability, XSS

Post navigation

Previous Post: Cisco Nexus Dashboard Fabric Controller Vulnerability Allows Attackers Device Impersonate as Managed Devices
Next Post: WordPress Admins Beware! Fake Cache Plugin that Steals Admin Logins

Related Posts

Conducting Risk Assessments That Drive Business Value Cyber Security News
WordPress TI WooCommerce Wishlist Plugin Vulnerability Exposes 100,000+ Websites To Cyberattack Cyber Security News
Windows DWM 0-Day Vulnerability Allows Attackers to Escalate Privileges Cyber Security News
IXON VPN Client Vulnerability Let Attackers Escalate Privileges Cyber Security News
ConnectWise Hacked – Nation State Actors Compromised the Systems to Access Customer Data Cyber Security News
APT Group 123 Actively Attacking Windows Systems to Deliver Malicious Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News