CVE-2025-54890

6.8 MEDIUM

📋 TL;DR

This stored cross-site scripting (XSS) vulnerability in Centreon Infra Monitoring allows authenticated users with elevated privileges to inject malicious scripts into the Hostgroup configuration page. When other users view the compromised page, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. The vulnerability affects multiple versions of Centreon Infra Monitoring across different release branches.

💻 Affected Systems

Products:
  • Centreon Infra Monitoring
Versions: 24.10.0 to 24.10.14, 24.04.0 to 24.04.18, 23.10.0 to 23.10.28
Operating Systems: All platforms running Centreon
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with elevated privileges (administrator or similar role) to exploit. The Hostgroup configuration page must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with elevated privileges could inject persistent malicious scripts that steal administrator credentials, hijack sessions, install backdoors, or pivot to other systems in the monitoring infrastructure.

🟠

Likely Case

Privileged users could inadvertently or maliciously inject scripts that steal session cookies or credentials from other administrators viewing the Hostgroup configuration page.

🟢

If Mitigated

With proper input validation and output encoding, the injected scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: MEDIUM - If the Centreon web interface is exposed to the internet, attackers could exploit this after obtaining elevated privileges through other means.
🏢 Internal Only: HIGH - Internal privileged users (malicious or compromised) can directly exploit this vulnerability to target other administrators within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple XSS payload injection by privileged users

Exploitation requires elevated privileges, reducing attack surface but increasing insider threat risk. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.10.15, 24.04.19, 23.10.29 or later

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-54890-centreon-web-medium-severity-5342

Restart Required: Yes

Instructions:

1. Backup your Centreon configuration and database. 2. Update to the patched version using your package manager (yum update centreon or apt-get update && apt-get upgrade centreon). 3. Restart Centreon services (systemctl restart centreon). 4. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for Hostgroup configuration fields

# Requires custom code modification - not recommended as primary fix

Privilege Reduction

all

Temporarily reduce the number of users with elevated privileges who can access Hostgroup configuration

# Review and modify user roles in Centreon administration interface

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Enable web application firewall (WAF) rules specifically blocking XSS patterns in Hostgroup parameters

🔍 How to Verify

Check if Vulnerable:

Check Centreon version via web interface (Administration > About) or command line: rpm -qa | grep centreon-web (RHEL/CentOS) or dpkg -l | grep centreon-web (Debian/Ubuntu)

Check Version:

rpm -q centreon-web || dpkg -s centreon-web | grep Version

Verify Fix Applied:

Confirm version is 24.10.15+, 24.04.19+, or 23.10.29+ and test XSS payload injection in Hostgroup configuration fields

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to Hostgroup configurations
  • Multiple failed login attempts followed by Hostgroup changes
  • Suspicious strings in web access logs containing script tags or JavaScript

Network Indicators:

  • Unexpected outbound connections from Centreon server after Hostgroup page access
  • Traffic patterns suggesting credential exfiltration

SIEM Query:

source="centreon.log" AND ("Hostgroup" AND ("<script" OR "javascript:" OR "onerror=" OR "onload="))

🔗 References

📤 Share & Export