CVE-2025-54168

4.8 MEDIUM

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in QuLog Center allows authenticated attackers with administrator privileges to inject malicious scripts. When exploited, this can bypass security controls or access sensitive application data. Only systems running vulnerable versions of QuLog Center are affected.

💻 Affected Systems

Products:
  • QNAP QuLog Center
Versions: All versions before 1.8.2.923
Operating Systems: QTS, QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator account access to exploit. Vulnerability is in the web interface component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with compromised admin credentials could execute arbitrary JavaScript in the context of other users' sessions, potentially stealing session tokens, performing actions as other users, or accessing sensitive log data.

🟠

Likely Case

An attacker with legitimate or compromised admin access could inject malicious scripts that execute when other administrators view affected pages, potentially leading to session hijacking or data exfiltration.

🟢

If Mitigated

With proper access controls and input validation, the impact is limited to administrators who view maliciously crafted content, with minimal risk to regular users.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials. The vulnerability is a classic stored XSS that can be exploited through the web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QuLog Center 1.8.2.923 (2025/08/27) and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-25-42

Restart Required: Yes

Instructions:

1. Log into QNAP NAS admin interface. 2. Navigate to App Center. 3. Check for updates to QuLog Center. 4. Update to version 1.8.2.923 or later. 5. Restart QuLog Center service.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit administrator accounts to only trusted personnel and implement strong authentication controls.

Web Application Firewall

all

Deploy a WAF with XSS protection rules to block malicious script injection attempts.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding for all user-controllable inputs in QuLog Center interface
  • Monitor administrator account activity for suspicious behavior and implement session timeouts

🔍 How to Verify

Check if Vulnerable:

Check QuLog Center version in QNAP App Center or via SSH: cat /etc/config/qpkg.conf | grep QuLogCenter

Check Version:

cat /etc/config/qpkg.conf | grep QuLogCenter

Verify Fix Applied:

Verify version is 1.8.2.923 or higher and test XSS payloads in input fields are properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator login patterns
  • Multiple failed login attempts to admin accounts
  • Suspicious POST requests to QuLog Center endpoints with script tags

Network Indicators:

  • HTTP requests containing script injection patterns to QuLog Center URLs
  • Unexpected outbound connections from QuLog Center server

SIEM Query:

source="*quLog*" AND (http_method=POST AND (uri="*quLog*" OR uri="*admin*") AND (content="*<script>*" OR content="*javascript:*" OR content="*onload=*"))

🔗 References

📤 Share & Export