Vulnerability Description
Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerability via StandaloneVpnClientsController.addStandaloneVpnClientAction(). Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Advantech | Webaccess\/Vpn | < 1.1.5 |
Related Weaknesses (CWE)
References
- https://icr.advantech.com/download/softwareProduct
- https://icr.advantech.com/support/router-models/download/511/sa-2025-01-vpn-portRelease Notes
- https://www.vulncheck.com/advisories/advantech-webaccess-vpn-stored-xss-via-stanThird Party Advisory
FAQ
What is CVE-2025-34237?
CVE-2025-34237 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerability via StandaloneVpnClientsController.addStandaloneVpnClientAction(). Insufficient validation or ...
How severe is CVE-2025-34237?
CVE-2025-34237 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-34237?
Check the references section above for vendor advisories and patch information. Affected products include: Advantech Webaccess\/Vpn.