The security advisory, released on June 4, 2025, marks these vulnerabilities as “Important” severity with CVSS scores ranging from 5.9 to 7.5.
The vulnerabilities, designated as CVE-2025-22243, CVE-2025-22244, and CVE-2025-22245, represent stored XSS attacks targeting different components of the NSX infrastructure.
The most severe vulnerability, CVE-2025-22243, affects the NSX Manager UI with a CVSS score of 7.5, where attackers with network configuration privileges can inject malicious code that executes when administrators view network settings.
CVE-2025-22244 targets the gateway firewall component with a CVSS score of 6.9, enabling attackers to compromise URL filtering response pages.
When users attempt to access filtered websites, the injected malicious code executes automatically. The third vulnerability, CVE-2025-22245, affects router port configurations with a CVSS score of 5.9, allowing code injection through router port modification interfaces.
All three vulnerabilities stem from improper input validation across the NSX platform, demonstrating a systemic issue in how the software handles user-provided data.
Security researchers Dawid Jonienc and Łukasz Rupala of ING Hubs, Poland, responsibly disclosed these vulnerabilities to VMware through private reporting channels.
The vulnerabilities affect multiple VMware product lines beyond standalone NSX deployments.
VMware Cloud Foundation versions 5.0.x through 5.2.x require asynchronous patching to address the NSX components, while VMware Telco Cloud Platform and Infrastructure products spanning versions 2.x through 5.x are also impacted.
The attack scenarios pose significant risks to enterprise environments. In the Manager UI vulnerability, attackers with existing network privileges can embed persistent malicious scripts that target administrators with elevated access.
The gateway firewall vulnerability creates opportunities for web-based attacks, where malicious code executes when users encounter filtered content.
Router port vulnerabilities enable attackers to compromise network infrastructure viewing interfaces, potentially affecting network operations personnel.
VMware’s assessment indicates that while these are stored XSS vulnerabilities rather than remote code execution vulnerabilities, they still present substantial security risks in enterprise environments where privileged users regularly interact with NSX interfaces.
VMware has released security patches across all affected NSX versions, with no temporary workarounds available for organizations seeking interim protection.
NSX 4.2.x users should upgrade to version 4.2.2.1, while 4.2.1.x installations require updating to 4.2.1.4. Both NSX 4.1.x and 4.0.x versions need upgrading to 4.1.2.6.
Cloud Foundation environments require asynchronous patching following VMware’s KB88287 guidance, while Telco Cloud products reference KB396986 for remediation procedures.
The absence of workarounds emphasizes the critical nature of implementing these patches promptly.
Organizations running affected VMware NSX deployments should prioritize these updates, particularly given the potential for privilege escalation and the persistent nature of stored XSS attacks.
Security teams should also review access controls for NSX management interfaces and monitor for suspicious activity in network configuration areas.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Update
The post VMware NSX XSS Vulnerabilities Allows Attackers to inject malicious code appeared first on Cyber Security News.
For what is believed to be the first time, the state plans to ask the…
Sarah Zuech teaches her four kids that charity begins at home. A person’s first responsibility,…
The Rockford School Board voted unanimously to approve new teacher contracts Wednesday night. This comes…
Cisco has disclosed a critical zero-day vulnerability in its Catalyst SD-WAN products that threat actors…
A hacker exploited Anthropic’s Claude AI chatbot over a month-long campaign starting in December 2025,…
ROCKFORD, Ill. (WTVO) — This week marks four years since Russia's invasion of Ukraine and…
This website uses cookies.