CVE-2025-22245

5.9 MEDIUM

📋 TL;DR

VMware NSX contains a stored Cross-Site Scripting vulnerability in the router port due to improper input validation. This allows authenticated attackers to inject malicious scripts that execute when other users view the affected interface. Organizations using vulnerable VMware NSX versions are affected.

💻 Affected Systems

Products:
  • VMware NSX
Versions: Specific versions not provided in CVE description; consult vendor advisory for affected versions
Operating Systems: All platforms running VMware NSX
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have authenticated access to the NSX management interface. The vulnerability exists in the router port component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions on behalf of victims, potentially leading to full network compromise.

🟠

Likely Case

Attackers with valid credentials could inject scripts to steal session tokens or credentials from other authenticated users, enabling lateral movement within the NSX environment.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: MEDIUM - If NSX management interface is exposed to the internet, attackers could exploit this after obtaining valid credentials.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could exploit this to compromise other users' sessions and escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity once the attack vector is identified. Requires authenticated access to the NSX interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult VMware security advisory for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25738

Restart Required: Yes

Instructions:

1. Review VMware security advisory for affected versions. 2. Download and apply the appropriate patch from VMware. 3. Restart affected NSX services as required. 4. Verify the fix is applied successfully.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation on the router port interface to sanitize user inputs

Content Security Policy

all

Implement strict Content Security Policy headers to restrict script execution

🧯 If You Can't Patch

  • Restrict access to NSX management interface to only trusted, necessary users
  • Implement web application firewall rules to detect and block XSS payloads

🔍 How to Verify

Check if Vulnerable:

Check your VMware NSX version against the affected versions listed in the VMware security advisory

Check Version:

Check NSX Manager web interface or use NSX CLI commands specific to your deployment

Verify Fix Applied:

After applying patches, verify the version has been updated and test the router port interface for XSS vulnerabilities

📡 Detection & Monitoring

Log Indicators:

  • Unusual script-like patterns in router port configuration logs
  • Multiple failed input validation attempts

Network Indicators:

  • Suspicious HTTP requests containing script tags or JavaScript to router port endpoints

SIEM Query:

source="nsx" AND ("script" OR "javascript" OR "onload" OR "onerror") AND dest_port="router_port"

🔗 References

📤 Share & Export