Vulnerabilities (CVE)

Filtered by vendor Arubanetworks Subscribe
Filtered by product Fabric Composer
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-23053 1 Arubanetworks 1 Fabric Composer 2025-04-16 N/A 6.5 MEDIUM
A privilege escalation vulnerability exists in the web-based management interface of HPE Aruba Networking Fabric Composer. Successful exploitation could allow an authenticated low privilege operator user to change the state of certain settings of a vulnerable system.
CVE-2025-23054 1 Arubanetworks 1 Fabric Composer 2025-04-16 N/A 6.5 MEDIUM
A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations.
CVE-2025-23057 1 Arubanetworks 1 Fabric Composer 2025-03-28 N/A 5.5 MEDIUM
A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.
CVE-2025-23056 1 Arubanetworks 1 Fabric Composer 2025-03-28 N/A 5.5 MEDIUM
A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.
CVE-2025-23055 1 Arubanetworks 1 Fabric Composer 2025-03-28 N/A 5.5 MEDIUM
A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.