{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-48470","assignerOrgId":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","state":"PUBLISHED","assignerShortName":"CSA","dateReserved":"2025-05-22T09:41:25.402Z","datePublished":"2025-06-24T02:19:33.670Z","dateUpdated":"2025-06-25T13:01:16.041Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Advantech Wireless Sensing and Equipment (WISE)","vendor":"Advantech","versions":[{"status":"affected","version":"A2.01 B00"}]}],"credits":[{"lang":"en","type":"finder","value":"Jay Turla"},{"lang":"en","type":"finder","value":"Japz Divino"},{"lang":"en","type":"finder","value":"Jerold Camacho"}],"datePublic":"2025-06-24T02:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users’ browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation."}],"value":"Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users’ browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":4.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"5f57b9bf-260d-4433-bf07-b6a79e9bb7d4","shortName":"CSA","dateUpdated":"2025-06-24T02:31:24.592Z"},"references":[{"url":"https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration.\n\n<br>"}],"value":"This vulnerability can be mitigated by enabling the Security Mode, an existing configuration feature available in previous firmware versions. Security Mode restricts access to unsecured web interfaces and disables unnecessary services to reduce attack surfaces. Users and administrators of affected products are strongly advised to enable Security Mode immediately after configuration."}],"source":{"discovery":"UNKNOWN"},"title":"Stored Cross site Scripting (XSS)","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-24T15:12:22.447926Z","id":"CVE-2025-48470","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-25T13:01:16.041Z"}}]}}