CVE-2025-8459

7.7 HIGH

📋 TL;DR

This stored XSS vulnerability in Centreon Infra Monitoring allows attackers to inject malicious scripts into web pages through the recurrent downtime scheduler modules. When users view affected pages, the scripts execute in their browsers, potentially stealing credentials or performing unauthorized actions. Affected users are those running Centreon Infra Monitoring versions 24.10.0-24.10.12, 24.04.0-24.04.17, or 23.10.0-23.10.27.

💻 Affected Systems

Products:
  • Centreon Infra Monitoring
Versions: 24.10.0 to 24.10.12, 24.04.0 to 24.04.17, 23.10.0 to 23.10.27
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the recurrent downtime scheduler modules. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, compromise monitoring data integrity, pivot to internal systems, or establish persistent backdoors in the monitoring infrastructure.

🟠

Likely Case

Attackers steal session cookies or authentication tokens to gain unauthorized access to the Centreon interface, potentially modifying monitoring configurations or accessing sensitive infrastructure data.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts are neutralized before reaching users' browsers, preventing execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to the Centreon interface. Stored XSS means payload persists and affects multiple users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 24.10.13, 24.04.18, or 23.10.28

Vendor Advisory: https://thewatch.centreon.com/latest-security-bulletins-64/cve-2025-8459-centreon-web-all-versions-high-severity-5117

Restart Required: Yes

Instructions:

1. Backup your Centreon configuration and database. 2. Update to the patched version using your package manager (yum update centreon or apt-get upgrade centreon). 3. Restart Centreon services: systemctl restart centreon centreon-gorgoned centreon-central. 4. Verify the update was successful.

🔧 Temporary Workarounds

Input Validation Enhancement

linux

Implement additional input validation for the recurrent downtime scheduler fields to reject suspicious characters.

# Requires modifying Centreon source code - not recommended for production

Output Encoding

linux

Ensure all user-controlled data displayed in the web interface is properly HTML-encoded.

# Requires modifying Centreon source code - not recommended for production

🧯 If You Can't Patch

  • Restrict access to the Centreon web interface using network segmentation and firewall rules
  • Implement Content Security Policy (CSP) headers to mitigate XSS impact

🔍 How to Verify

Check if Vulnerable:

Check Centreon version: rpm -qa | grep centreon-web or dpkg -l | grep centreon-web. If version is between affected ranges, system is vulnerable.

Check Version:

rpm -qa | grep centreon-web || dpkg -l | grep centreon-web

Verify Fix Applied:

After patching, verify version shows 24.10.13, 24.04.18, or 23.10.28 or higher. Test the recurrent downtime scheduler functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to downtime scheduler endpoints
  • Suspicious JavaScript payloads in web server logs
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from Centreon server
  • Traffic patterns suggesting data exfiltration

SIEM Query:

source="centreon-web.log" AND ("downtime" OR "scheduler") AND ("script" OR "javascript" OR "onerror" OR "onload")

🔗 References

📤 Share & Export