CVE-2025-8430

6.8 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Centreon Infra Monitoring allows authenticated users with elevated privileges to inject malicious scripts into the Commands Connectors configuration modules. When other users view these configurations, the scripts execute in their browsers, potentially compromising their sessions or performing unauthorized actions. The vulnerability affects multiple versions of Centreon Infra Monitoring across different release branches.

💻 Affected Systems

Products:
  • Centreon Infra Monitoring
Versions: 24.10.0 to 24.10.12, 24.04.0 to 24.04.17, 23.10.0 to 23.10.27
Operating Systems: All supported platforms running Centreon
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with elevated privileges to exploit. The vulnerability is in the Commands Connectors configuration modules.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attackers could steal administrator credentials, create backdoor accounts, modify monitoring configurations to hide malicious activity, or pivot to other systems in the network.

🟠

Likely Case

Privileged insiders or compromised accounts could perform session hijacking, data theft, or limited privilege escalation within the Centreon application.

🟢

If Mitigated

With proper access controls and input validation, impact is limited to isolated session compromise for users viewing malicious configurations.

🌐 Internet-Facing: MEDIUM - If Centreon is exposed to the internet, attackers could exploit compromised privileged accounts to target external users.
🏢 Internal Only: MEDIUM - Internal privileged users or compromised accounts can still exploit this to target other internal users and systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires privileged access to the Centreon interface. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.10.13, 24.04.18, 23.10.28

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8430-centreon-web-all-versions-medium-severity-5118

Restart Required: No

Instructions:

1. Backup your Centreon configuration and database. 2. Update to the patched version using your package manager (yum update centreon-web or apt-get upgrade centreon-web). 3. Verify the update completed successfully. 4. Clear browser caches for all users.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for Commands Connectors configuration fields

# Requires custom development - implement proper HTML encoding for all user inputs in Commands Connectors modules

Privilege Reduction

all

Temporarily reduce privileges for users who don't need access to Commands Connectors configuration

# Use Centreon ACLs to restrict access to Commands Connectors modules to only essential administrators

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Enable audit logging for all Commands Connectors configuration changes and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check your Centreon version via the web interface (Administration > About) or command line: rpm -qa | grep centreon-web

Check Version:

rpm -qa | grep centreon-web  # For RPM-based systems
apt list --installed | grep centreon-web  # For Debian-based systems

Verify Fix Applied:

Verify version is 24.10.13, 24.04.18, or 23.10.28 or higher. Test input fields in Commands Connectors configuration for proper HTML encoding.

📡 Detection & Monitoring

Log Indicators:

  • Unusual modifications to Commands Connectors configuration
  • Multiple failed login attempts followed by successful privileged access
  • Suspicious JavaScript payloads in configuration change logs

Network Indicators:

  • Unexpected outbound connections from Centreon server after configuration changes
  • Traffic patterns suggesting data exfiltration

SIEM Query:

source="centreon.log" AND ("Commands Connectors" OR "configuration modified") AND ("script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export