7.3

CVE-2025-64999

Medienbericht
Improper neutralization of input in Checkmk versions 2.4.0 before 2.4.0p22, and 2.3.0 before 2.3.0p43 allows an attacker that can manipulate a host's check output to inject malicious JavaScript into the Synthetic Monitoring HTML logs, which can then be accessed via a crafted phishing link.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CheckmkCheckmk Version2.3.0 Update-
CheckmkCheckmk Version2.3.0 Updateb1
CheckmkCheckmk Version2.3.0 Updateb2
CheckmkCheckmk Version2.3.0 Updateb3
CheckmkCheckmk Version2.3.0 Updateb4
CheckmkCheckmk Version2.3.0 Updateb5
CheckmkCheckmk Version2.3.0 Updateb6
CheckmkCheckmk Version2.3.0 Updatep1
CheckmkCheckmk Version2.3.0 Updatep10
CheckmkCheckmk Version2.3.0 Updatep11
CheckmkCheckmk Version2.3.0 Updatep12
CheckmkCheckmk Version2.3.0 Updatep13
CheckmkCheckmk Version2.3.0 Updatep14
CheckmkCheckmk Version2.3.0 Updatep15
CheckmkCheckmk Version2.3.0 Updatep16
CheckmkCheckmk Version2.3.0 Updatep17
CheckmkCheckmk Version2.3.0 Updatep18
CheckmkCheckmk Version2.3.0 Updatep19
CheckmkCheckmk Version2.3.0 Updatep2
CheckmkCheckmk Version2.3.0 Updatep20
CheckmkCheckmk Version2.3.0 Updatep21
CheckmkCheckmk Version2.3.0 Updatep22
CheckmkCheckmk Version2.3.0 Updatep23
CheckmkCheckmk Version2.3.0 Updatep24
CheckmkCheckmk Version2.3.0 Updatep25
CheckmkCheckmk Version2.3.0 Updatep26
CheckmkCheckmk Version2.3.0 Updatep27
CheckmkCheckmk Version2.3.0 Updatep28
CheckmkCheckmk Version2.3.0 Updatep29
CheckmkCheckmk Version2.3.0 Updatep3
CheckmkCheckmk Version2.3.0 Updatep30
CheckmkCheckmk Version2.3.0 Updatep31
CheckmkCheckmk Version2.3.0 Updatep32
CheckmkCheckmk Version2.3.0 Updatep33
CheckmkCheckmk Version2.3.0 Updatep34
CheckmkCheckmk Version2.3.0 Updatep35
CheckmkCheckmk Version2.3.0 Updatep36
CheckmkCheckmk Version2.3.0 Updatep37
CheckmkCheckmk Version2.3.0 Updatep38
CheckmkCheckmk Version2.3.0 Updatep39
CheckmkCheckmk Version2.3.0 Updatep4
CheckmkCheckmk Version2.3.0 Updatep40
CheckmkCheckmk Version2.3.0 Updatep41
CheckmkCheckmk Version2.3.0 Updatep42
CheckmkCheckmk Version2.3.0 Updatep5
CheckmkCheckmk Version2.3.0 Updatep6
CheckmkCheckmk Version2.3.0 Updatep7
CheckmkCheckmk Version2.3.0 Updatep8
CheckmkCheckmk Version2.3.0 Updatep9
CheckmkCheckmk Version2.4.0 Update-
CheckmkCheckmk Version2.4.0 Updateb1
CheckmkCheckmk Version2.4.0 Updateb2
CheckmkCheckmk Version2.4.0 Updateb3
CheckmkCheckmk Version2.4.0 Updateb4
CheckmkCheckmk Version2.4.0 Updateb5
CheckmkCheckmk Version2.4.0 Updateb6
CheckmkCheckmk Version2.4.0 Updatep1
CheckmkCheckmk Version2.4.0 Updatep10
CheckmkCheckmk Version2.4.0 Updatep11
CheckmkCheckmk Version2.4.0 Updatep12
CheckmkCheckmk Version2.4.0 Updatep13
CheckmkCheckmk Version2.4.0 Updatep14
CheckmkCheckmk Version2.4.0 Updatep15
CheckmkCheckmk Version2.4.0 Updatep16
CheckmkCheckmk Version2.4.0 Updatep17
CheckmkCheckmk Version2.4.0 Updatep18
CheckmkCheckmk Version2.4.0 Updatep19
CheckmkCheckmk Version2.4.0 Updatep2
CheckmkCheckmk Version2.4.0 Updatep20
CheckmkCheckmk Version2.4.0 Updatep21
CheckmkCheckmk Version2.4.0 Updatep3
CheckmkCheckmk Version2.4.0 Updatep4
CheckmkCheckmk Version2.4.0 Updatep5
CheckmkCheckmk Version2.4.0 Updatep6
CheckmkCheckmk Version2.4.0 Updatep7
CheckmkCheckmk Version2.4.0 Updatep8
CheckmkCheckmk Version2.4.0 Updatep9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.083
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
security@checkmk.com 7.3 0 0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.