EUVD-2025-19858

| CVE-2025-6563 MEDIUM
Improper Input Validation (CWE-20)
2025-07-03 1c6b5737-9389-4011-8117-89fa251edfb2
4.8
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
A

Lifecycle Timeline

5
Patch available
Apr 16, 2026 - 05:29 EUVD
7.19.2
Analysis Generated
Mar 16, 2026 - 02:12 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 02:12 euvd
EUVD-2025-19858
PoC Detected
Jul 03, 2025 - 15:13 vuln.today
Public exploit code
CVE Published
Jul 03, 2025 - 12:15 nvd
MEDIUM 4.8

DescriptionNVD

A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the javascript protocol in the dst parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.

Analysis

A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the javascript protocol in the dst parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload.

Technical ContextAI

Cross-site scripting (XSS) allows injection of client-side scripts into web pages viewed by other users due to insufficient output encoding. This vulnerability is classified as Improper Input Validation (CWE-20).

RemediationAI

Encode all user-supplied output contextually (HTML, JS, URL). Implement Content Security Policy (CSP) headers. Use HTTPOnly and Secure cookie flags.

Share

EUVD-2025-19858 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy