VYPR
Medium severity6.5NVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2025-40904

CVE-2025-40904

Description

A Stored HTML Injection vulnerability was discovered in the Smart Polling functionality due to improper validation of an input parameter. An authenticated user with limited privileges can push malicious remote strategies containing HTML tags through the sync. When a victim views the affected remote strategy in the Smart Polling functionality, the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored HTML injection in Smart Polling of Guardian/CMC before 26.1.0 allows authenticated low-privilege users to inject HTML via remote strategies, enabling phishing and open redirect.

Vulnerability

A stored HTML injection vulnerability exists in the Smart Polling functionality of Guardian and CMC versions prior to 26.1.0 [1]. The vulnerability arises from improper validation of an input parameter, allowing an authenticated user with limited privileges to inject arbitrary HTML tags into remote strategies that are synchronized via the sync mechanism [1].

Exploitation

An attacker must have authenticated access with limited privileges to push remote strategies [1]. The attacker crafts a remote strategy containing malicious HTML tags and pushes it through the sync process [1]. When a victim views the affected remote strategy in the Smart Polling functionality, the injected HTML is rendered in their browser [1]. No additional user interaction beyond viewing the strategy is required.

Impact

The injected HTML renders in the victim's browser, enabling phishing attacks and potentially open redirect attacks [1]. However, full cross-site scripting (XSS) exploitation and direct information disclosure are prevented by existing input validation and the Content Security Policy (CSP) configuration [1]. The impact is limited to HTML injection, which can be used for social engineering.

Mitigation

The vulnerability is fixed in version 26.1.0 of Guardian and CMC [1]. As a workaround, administrators should review all enabled sensors and disallow or delete untrusted ones [1]. Users are advised to upgrade to version 26.1.0 or later [1].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.