A client-side path traversal vulnerability was discovered in the web management interface front-end due to missing validation of an input parameter. An authenticated user with limited privileges can craft a malicious URL which, if visited by an authenticated victim, leads to a Cross-Site Scripting (XSS) attack.
References
| Link | Resource |
|---|---|
| https://security.nozominetworks.com/NN-2025:4-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
09 Oct 2025, 16:39
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:* cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:* |
|
| References | () https://security.nozominetworks.com/NN-2025:4-01 - Vendor Advisory | |
| First Time |
Nozominetworks cmc
Nozominetworks guardian Nozominetworks |
07 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-07 13:15
Updated : 2025-10-09 16:39
NVD link : CVE-2025-3718
Mitre link : CVE-2025-3718
CVE.ORG link : CVE-2025-3718
JSON object : View
Products Affected
nozominetworks
- guardian
- cmc
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
