VYPR
Medium severity6.1NVD Advisory· Published Nov 20, 2025· Updated Apr 15, 2026

CVE-2025-64984

CVE-2025-64984

Description

Kaspersky has fixed a security issue in Kaspersky Endpoint Security for Linux (any version with anti-virus databases prior to 18.11.2025), Kaspersky Industrial CyberSecurity for Linux Nodes (any version with anti-virus databases prior to 18.11.2025), and Kaspersky Endpoint Security for Mac (12.0.0.325, 12.1.0.553, and 12.2.0.694 with anti-virus databases prior to 18.11.2025) that could have allowed a reflected XSS attack to be carried out by an attacker using phishing techniques.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Kaspersky Endpoint Security for Linux and Mac, and Industrial CyberSecurity for Linux, allows phishing-based attacks via malformed input.

Vulnerability

Overview CVE-2025-64984 is a reflected cross-site scripting (XSS) vulnerability in Kaspersky Endpoint Security for Linux, Kaspersky Industrial CyberSecurity for Linux Nodes, and Kaspersky Endpoint Security for Mac (versions 12.0.0.325, 12.1.0.553, and 12.2.0.694). The issue exists in anti-virus databases prior to November 18, 2025, and arises from improper sanitization of user-controlled input, allowing an attacker to inject arbitrary JavaScript code [1].

Exploitation

Prerequisites An attacker can exploit this vulnerability through phishing techniques, such as sending a crafted link that, when clicked by a victim, reflects malicious script in the product's user interface. No authentication is required; the attack is triggered simply by the victim interacting with the crafted link. The attacker must convince the user to navigate to a specially crafted URL.

Impact

Successful exploitation enables the attacker to execute arbitrary JavaScript in the context of the affected product. This could lead to actions such as stealing session tokens, performing malicious operations within the product's interface, or redirecting the user to attacker-controlled content.

Mitigation

Kaspersky has addressed this issue by releasing updated anti-virus databases dated November 18, 2025, or later. Users are advised to ensure their products are updated to the latest database versions. The advisory is documented in Kaspersky's list of advisories [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.