No advisories yet.
Solution
Upgrade to v26.1.0 or later.
Workaround
Review all enabled sensors and disallow or delete untrusted ones.
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2026:7-01 |
|
Tue, 19 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored HTML Injection vulnerability was discovered in the Smart Polling functionality due to improper validation of an input parameter. An authenticated user with limited privileges can push malicious remote strategies containing HTML tags through the sync. When a victim views the affected remote strategy in the Smart Polling functionality, the injected HTML renders in their browser, enabling phishing and possibly open redirect attacks. Full XSS exploitation and direct information disclosure are prevented by the existing input validation and Content Security Policy configuration. | |
| Title | HTML injection in Smart Polling in Guardian/CMC before 26.1.0 | |
| First Time appeared |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:nozomi_networks:cmc:*:*:*:*:*:*:*:* cpe:2.3:a:nozomi_networks:guardian:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Nozomi Networks
Nozomi Networks cmc Nozomi Networks guardian |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2026-05-19T13:56:35.147Z
Reserved: 2025-04-16T09:04:35.923Z
Link: CVE-2025-40904
Updated: 2026-05-19T13:56:26.204Z
Status : Awaiting Analysis
Published: 2026-05-19T14:16:28.293
Modified: 2026-05-19T14:37:55.490
Link: CVE-2025-40904
No data.
OpenCVE Enrichment
No data.