VYPR
Medium severity5.4NVD Advisory· Published Apr 9, 2026· Updated May 5, 2026

CVE-2025-70365

CVE-2025-70365

Description

A stored cross-site scripting (XSS) vulnerability exists in Kiamo before 8.4 due to improper output encoding of user-supplied input in administrative interfaces. An authenticated administrative user can inject arbitrary JavaScript code that is executed in the browser of users viewing the affected pages. NOTE: the Supplier's position is that a fix for this had already been released for the 8.3.1 branch before the CVE Record was published.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Kiamo administrative interfaces allows authenticated admins to inject arbitrary JavaScript, leading to session hijacking. Fixed in version 8.4.

Kiamo before version 8.4 contains a stored cross-site scripting (XSS) vulnerability in its administrative interface due to improper output encoding of user-supplied input in fields such as the 'description' field [1]. This allows an authenticated administrative user to inject arbitrary JavaScript code that is stored and later executed in the browsers of other users viewing the affected pages.

An attacker with administrative privileges can exploit this by injecting a malicious payload into a vulnerable field (e.g., description) via the admin interface. When a user (including the attacker themselves or other admins) visits the page containing the injected data, the JavaScript executes in their browser context. The proof-of-concept demonstrates successful cookie theft, specifically the kiamo_session cookie, which contains session information [1].

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the affected page, potentially leading to session hijacking, privilege escalation, or further compromise of the administrative interface and underlying data [1].

The vulnerability has been fixed in Kiamo version 8.4, and the vendor states that a fix was already released for the 8.3.1 branch prior to the CVE publication [1]. Until patches can be applied, it is recommended to restrict access to the administrative interfaces and monitor for suspicious input in vulnerable fields [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.