CVE-2025-43486

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in Poly Clariti Manager versions before 10.12.1 allows attackers to inject malicious scripts that execute when other users view affected pages. This affects organizations using vulnerable versions of Poly Clariti Manager for video collaboration management. The vulnerability requires user interaction but can lead to session hijacking or credential theft.

💻 Affected Systems

Products:
  • Poly Clariti Manager
Versions: All versions prior to 10.12.1
Operating Systems: All supported OS platforms for Poly Clariti Manager
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the web interface where user input is stored and rendered without proper sanitization.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, redirect users to malicious sites, or perform actions on behalf of authenticated users.

🟠

Likely Case

Attackers inject malicious scripts to steal session cookies or credentials from users who view compromised pages, potentially gaining unauthorized access to the management interface.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before execution, preventing any impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the ability to inject malicious scripts into stored content that other users will view.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.12.1

Vendor Advisory: https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037

Restart Required: Yes

Instructions:

1. Download Poly Clariti Manager version 10.12.1 from HP support portal. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the Poly Clariti Manager service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall rules or input validation to block script tags and malicious payloads.

WAF specific - configure rules to block <script>, javascript:, and common XSS payloads

🧯 If You Can't Patch

  • Restrict access to Poly Clariti Manager to trusted networks only using firewall rules.
  • Implement Content Security Policy (CSP) headers to restrict script execution sources.

🔍 How to Verify

Check if Vulnerable:

Check Poly Clariti Manager version in web interface admin panel or via system information commands.

Check Version:

Check web interface: Admin > System > About, or CLI: show version

Verify Fix Applied:

Verify version is 10.12.1 or later in admin interface and test input fields for script execution.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags or encoded payloads to input endpoints
  • Multiple failed login attempts following script injection

Network Indicators:

  • HTTP requests containing <script> tags or javascript: URIs to Poly Clariti Manager

SIEM Query:

source="poly_clariti_logs" AND (http_request="*<script>*" OR http_request="*javascript:*")

🔗 References

📤 Share & Export