A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2025:4-01 |
![]() ![]() |
History
Tue, 07 Oct 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 07 Oct 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack. | |
Title | Client-side path traversal in Guardian/CMC before 25.2.0 | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-10-07T13:21:49.093Z
Reserved: 2025-04-16T09:04:05.707Z
Link: CVE-2025-3718

Updated: 2025-10-07T13:20:27.476Z

Status : Received
Published: 2025-10-07T13:15:33.640
Modified: 2025-10-07T13:15:33.640
Link: CVE-2025-3718

No data.

No data.