First published: Wed Mar 26 2025(Updated: )
Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework Icinga Web 2. A vulnerability present in versions 0.10.0 through 1.0.2 allows to set up a template that allows to embed arbitrary Javascript. This enables the attacker to act on behalf of the user, if the template is being previewed; and act on behalf of the headless browser, if a report using the template is printed to PDF. This issue has been resolved in version 1.0.3 of Icinga Reporting. As a workaround, review all templates and remove suspicious settings.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Icinga Reporting | >=0.10.0<1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-27406 is classified as a medium severity vulnerability due to its potential to execute arbitrary JavaScript through template setups.
To fix CVE-2025-27406, upgrade Icinga Reporting to version 1.0.3 or later.
CVE-2025-27406 affects Icinga Reporting versions from 0.10.0 to 1.0.2.
The vulnerability in CVE-2025-27406 allows for the embedding of arbitrary JavaScript due to improper template handling.
There are no known workarounds for CVE-2025-27406, and upgrading is recommended to mitigate the risk.