CVE-2025-52217
📋 TL;DR
SelectZero Data Observability Platform versions before 2025.5.2 are vulnerable to HTML injection in legacy UI fields. This allows attackers to inject arbitrary HTML content, potentially leading to cross-site scripting attacks. Organizations using affected versions of this platform are at risk.
💻 Affected Systems
- SelectZero Data Observability Platform
📦 What is this software?
Selectzero by Selectzero
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions on behalf of authenticated users.
Likely Case
Attackers inject HTML that defaces the application interface or creates misleading content for users.
If Mitigated
With proper input validation and output encoding, injected HTML would be rendered as plain text without executing scripts.
🎯 Exploit Status
Requires access to legacy UI fields with input capabilities; exploitation depends on user interaction with injected content.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.5.2
Vendor Advisory: https://selectzero.io/change-log/
Restart Required: No
Instructions:
1. Backup current configuration. 2. Upgrade to version 2025.5.2 or later. 3. Verify legacy UI fields now properly sanitize HTML input.
🔧 Temporary Workarounds
Disable Legacy UI
allDisable or restrict access to legacy UI components that contain vulnerable fields
Input Validation Filter
allImplement web application firewall rules or input validation to strip HTML tags from legacy UI field submissions
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to prevent script execution from injected content
- Monitor and audit all user input in legacy UI fields for HTML patterns
🔍 How to Verify
Check if Vulnerable:
Check if version is below 2025.5.2 and test legacy UI fields by attempting to submit HTML content like <b>test</b>
Check Version:
Check platform admin interface or configuration files for version information
Verify Fix Applied:
After upgrade to 2025.5.2+, test that HTML submitted to legacy UI fields is properly sanitized and displayed as plain text
📡 Detection & Monitoring
Log Indicators:
- Unusual HTML patterns in user input logs
- Multiple failed HTML injection attempts
Network Indicators:
- HTTP requests containing HTML tags in parameter values for legacy UI endpoints
SIEM Query:
source="selectzero" AND (message="*<script>*" OR message="*<img*" OR message="*onerror=*")