CVE-2025-8429

6.8 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Centreon Infra Monitoring allows authenticated users with elevated privileges to inject malicious scripts into ACL Action access configuration modules. When other users view these pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. Affected versions include 24.10.0-24.10.12, 24.04.0-24.04.17, and 23.10.0-23.10.27.

💻 Affected Systems

Products:
  • Centreon Infra Monitoring
Versions: 24.10.0 to 24.10.12, 24.04.0 to 24.04.17, 23.10.0 to 23.10.27
Operating Systems: Any OS running Centreon
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects ACL Action access configuration modules. Requires user with 'ACL Action' configuration privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker steals administrator credentials, gains full system control, and pivots to other systems in the network.

🟠

Likely Case

Malicious insider or compromised privileged account steals session cookies, escalates privileges, or performs unauthorized configuration changes.

🟢

If Mitigated

Limited to data theft from users who view the malicious configuration pages, with no direct system compromise.

🌐 Internet-Facing: MEDIUM - Requires authenticated privileged access, but internet-facing instances increase attack surface.
🏢 Internal Only: MEDIUM - Internal privileged users or compromised accounts can exploit this for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user with elevated privileges in ACL Action configuration. Exploitation involves injecting scripts into configuration fields that persist and execute when viewed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.10.13, 24.04.18, 23.10.28

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8429-centreon-web-all-versions-medium-severity-5119

Restart Required: No

Instructions:

1. Backup your Centreon configuration and database. 2. Update to patched version via package manager (yum update centreon-web or apt upgrade centreon-web). 3. Verify update completed successfully. 4. Clear browser caches and test ACL Action configuration functionality.

🔧 Temporary Workarounds

Restrict ACL Action Configuration Access

all

Temporarily remove ACL Action configuration privileges from non-essential users until patching.

# Review and modify user roles in Centreon Administration > ACL > Actions

Input Validation Enhancement

all

Implement additional input sanitization for ACL Action configuration fields via custom validation rules.

# Add custom validation in Centreon configuration files for ACL Action input fields

🧯 If You Can't Patch

  • Implement strict least-privilege access control for ACL Action configuration modules
  • Deploy WAF with XSS protection rules specifically for Centreon paths

🔍 How to Verify

Check if Vulnerable:

Check Centreon version via web interface (Administration > About) or command: rpm -qa | grep centreon-web

Check Version:

rpm -qa | grep centreon-web  # or dpkg -l | grep centreon-web

Verify Fix Applied:

Confirm version is 24.10.13, 24.04.18, or 23.10.28 or higher. Test ACL Action configuration fields for script injection attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ACL Action configuration modifications
  • Multiple failed login attempts followed by ACL configuration changes
  • Suspicious strings in Centreon web logs containing script tags

Network Indicators:

  • Unexpected outbound connections from Centreon server after ACL configuration changes

SIEM Query:

source="centreon.log" AND ("ACL Action" OR "configuration modified") AND ("script" OR "javascript:" OR "onload=")

🔗 References

📤 Share & Export