Broadcom has issued a high-severity safety advisory (VMSA-2025-0012) for VMware NSX, addressing three newly found saved Cross-Website Scripting (XSS) vulnerabilities: CVE-2025-22243, CVE-2025-22244, and CVE-2025-22245.
These vulnerabilities affect the NSX Supervisor UI, gateway firewall, and router port elements, exposing organizations to potential code injection assaults if left unpatched.
The vulnerabilities, all stemming from improper enter validation, permit authenticated attackers to inject malicious scripts that execute when affected interfaces are considered by different customers.
The issues are labeled as Necessary, with CVSSv3 base scores starting from 5.9 to 7.5, and no workarounds are at present out there.
Technical Particulars and Exploit Eventualities
CVE-2025-22243 impacts the NSX Supervisor UI, the place attackers with privileges to change community settings can inject persistent scripts.
When one other person accesses the compromised settings, the malicious code executes of their browser context, doubtlessly resulting in session hijacking or information exfiltration.
CVE-2025-22244 targets the gateway firewall, enabling attackers to change response pages for URL filtering.
This vulnerability might be exploited to execute injected scripts each time a person accesses a filtered web site.
Its CVSSv3 rating is 6.9, reflecting reasonable severity however vital threat in multi-user environments.
CVE-2025-22245 impacts router ports, the place a privileged attacker can inject scripts into router port configurations.
Unsuspecting directors or customers accessing these ports could set off the malicious payload, with a CVSSv3 rating of 5.9.
All three vulnerabilities are labeled below CWE-79 (Improper Neutralization of Enter Throughout Internet Web page Era), a standard class for XSS flaws.
Instance XSS Payload:
javascript
If such a payload is injected right into a susceptible area, it’s going to execute within the browser of any person who views the affected configuration web page.
Broadcom recommends rapid patching, as there are not any efficient workarounds.
The next desk summarizes the affected merchandise, CVEs, severity, and glued variations:
Product/Platform | Variations Affected | CVEs | CVSSv3 Scores | Mounted Model / Patch |
---|---|---|---|---|
VMware NSX | 4.2.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | 4.2.2.1 |
VMware NSX | 4.2.1.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | 4.2.1.4 |
VMware NSX | 4.1.x, 4.0.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | 4.1.2.6 |
VMware Cloud Basis | 5.2.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | Async patch to NSX 4.2.2.1 |
VMware Cloud Basis | 5.1.x, 5.0.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | Async patch to NSX 4.1.2.6 |
VMware Telco Cloud Infrastructure | 3.x, 2.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | KB396986 |
VMware Telco Cloud Platform | 5.x, 4.x, 3.x | 22243, 22244, 22245 | 7.5, 6.9, 5.9 | KB396986 |
To remediate, directors should improve to the fastened variations listed above.
For VMware Cloud Basis and Telco Cloud Platform, asynchronous patching guides can be found in Broadcom’s data base.
Business Response and Greatest Practices
Safety researchers Dawid Jonienc and Łukasz Rupala have been credited for responsibly disclosing these vulnerabilities.
The advisory underscores the significance of well timed patch administration, particularly for essential infrastructure elements comparable to NSX, which underpin community virtualization and safety in enterprise environments.
Organizations operating affected variations ought to prioritize patch deployment and evaluation entry controls to reduce the danger of exploitation.
Since no workarounds exist, delaying updates leaves methods susceptible to XSS assaults that would compromise administrative classes or facilitate lateral motion throughout the community.
For additional particulars, directors can seek the advice of VMware’s official advisory (VMSA-2025-0012) and the referenced CVE entries for technical breakdowns and patch directions.
To Improve Your Cybersecurity Expertise, Take Diamond Membership With 150+ Sensible Cybersecurity Programs On-line – Enroll Right here