CVE-2025-27406

7.6 HIGH

📋 TL;DR

This vulnerability in Icinga Reporting allows attackers to embed arbitrary JavaScript in report templates. When previewed, this enables attackers to act on behalf of the user; when printed to PDF, it allows acting on behalf of the headless browser. Affected systems are Icinga Web 2 installations using the reporting module versions 0.10.0 through 1.0.2.

💻 Affected Systems

Products:
  • Icinga Web 2 Reporting Module
Versions: 0.10.0 through 1.0.2
Operating Systems: All platforms running Icinga Web 2
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the template functionality of the reporting module; all installations using affected versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of user sessions and headless browser privileges, potentially leading to data theft, privilege escalation, or lateral movement within the monitoring infrastructure.

🟠

Likely Case

Session hijacking, credential theft, and unauthorized access to monitoring data through cross-site scripting attacks.

🟢

If Mitigated

Limited impact with proper template review and access controls, potentially only affecting report generation functionality.

🌐 Internet-Facing: HIGH if reporting interface is exposed to internet, as attackers can craft malicious templates.
🏢 Internal Only: MEDIUM as internal attackers could still exploit this to compromise other users or the headless browser.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to create or modify report templates, which typically requires authenticated access to the reporting module.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.3

Vendor Advisory: https://github.com/Icinga/icingaweb2-module-reporting/security/advisories/GHSA-7qvq-54vm-r7hx

Restart Required: No

Instructions:

1. Backup current configuration. 2. Download version 1.0.3 from GitHub releases. 3. Replace the reporting module directory with the new version. 4. Clear any caching mechanisms. 5. Verify functionality.

🔧 Temporary Workarounds

Template Review and Sanitization

all

Manually review all report templates and remove any suspicious JavaScript or template settings that could embed arbitrary code.

🧯 If You Can't Patch

  • Restrict access to template creation/modification to trusted administrators only
  • Disable report preview functionality and PDF generation if not essential

🔍 How to Verify

Check if Vulnerable:

Check the reporting module version by examining the module directory or using Icinga Web 2's module management interface.

Check Version:

Check the version in /usr/share/icingaweb2/modules/reporting/CHANGELOG.md or similar location

Verify Fix Applied:

Verify the reporting module version is 1.0.3 or higher and test template functionality to ensure JavaScript injection is prevented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual template modifications
  • Multiple failed template validation attempts
  • Suspicious JavaScript in template content

Network Indicators:

  • Unusual requests to report preview endpoints
  • Suspicious PDF generation requests

SIEM Query:

Search for: 'template modification' AND 'reporting' OR 'preview' AND 'javascript' in web application logs

🔗 References

📤 Share & Export