CVE-2025-57539
📋 TL;DR
A stored cross-site scripting (XSS) vulnerability in Proxmox Virtual Environment 8.4 allows authenticated users to inject malicious scripts into the U2F Origin field. When other users view the affected configuration page, the scripts execute in their browser context, potentially compromising their sessions. This affects all Proxmox VE 8.4 installations with authenticated user access.
💻 Affected Systems
- Proxmox Virtual Environment
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions as other users, redirect to malicious sites, or deploy ransomware through the management interface.
Likely Case
Authenticated attackers with malicious intent could hijack administrator sessions to gain full control of the virtualization environment.
If Mitigated
With proper access controls and monitoring, impact is limited to authenticated users only, reducing exposure to trusted personnel.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of the Web UI. Proof-of-concept code is publicly available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Proxmox VE 8.5 or later
Vendor Advisory: https://forum.proxmox.com/threads/proxmox-virtual-environment-security-advisories.149331/page-2#post-792010
Restart Required: No
Instructions:
1. Update Proxmox VE to version 8.5 or later using 'apt update && apt dist-upgrade'. 2. Verify the update completed successfully. 3. Clear browser cache to ensure new UI loads.
🔧 Temporary Workarounds
Input Validation via Web UI
allManually validate and sanitize all U2F Origin field inputs before saving configurations.
🧯 If You Can't Patch
- Restrict access to Datacenter configuration to trusted administrators only.
- Implement web application firewall (WAF) rules to block XSS payloads in U2F Origin fields.
🔍 How to Verify
Check if Vulnerable:
Check if running Proxmox VE version 8.4 using 'pveversion' command.
Check Version:
pveversion
Verify Fix Applied:
Verify version is 8.5 or later with 'pveversion' and test U2F Origin field input sanitization.
📡 Detection & Monitoring
Log Indicators:
- Unusual modifications to Datacenter configuration
- Multiple failed login attempts followed by configuration changes
Network Indicators:
- Suspicious JavaScript payloads in HTTP POST requests to /api2/json/nodes/{node}/config
SIEM Query:
source="proxmox" AND (event="config_change" AND field="u2f_origin")