{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T03:13:25.001","vulnerabilities":[{"cve":{"id":"CVE-2025-23169","sourceIdentifier":"support@hackerone.com","published":"2025-06-19T00:15:21.497","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers.  \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."},{"lang":"es","value":"La plataforma de orquestación Versa Director SD-WAN permite personalizar la interfaz de usuario, incluyendo el encabezado, el pie de página y el logotipo. Sin embargo, la información proporcionada para estas personalizaciones no se valida ni se depura adecuadamente, lo que permite que un usuario malintencionado inyecte y almacene cargas útiles de Cross-site Scripting (XSS). Estado de explotación: Versa Networks no tiene constancia de ningún caso de explotación de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigación: No existen soluciones alternativas para desactivar la opción de la interfaz gráfica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."}],"metrics":{"cvssMetricV31":[{"source":"support@hackerone.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"references":[{"url":"https://security-portal.versa-networks.com/emailbulletins/68526a08dc94d6b9f2faf716","source":"support@hackerone.com"},{"url":"https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3","source":"support@hackerone.com"},{"url":"https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2","source":"support@hackerone.com"},{"url":"https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3","source":"support@hackerone.com"},{"url":"https://support.versa-networks.com/support/solutions/articles/23000026708-release-22-1-4","source":"support@hackerone.com"}]}}]}