Rewterz
Copilot Studio Connected Agents Exploited by Hackers for Backdoor Access
December 30, 2025
Rewterz
CISA Flags MongoDB MongoBleed Flaw as High Exposure Risk
December 31, 2025

Stored XSS in Ivanti EPM Allows Admin Session Hijacking

Severity

High

Analysis Summary

A critical stored cross-site scripting (XSS) vulnerability has been identified in Ivanti Endpoint Manager (EPM) versions 2024 SU4 and earlier, tracked as CVE-2025-10573 and assigned a CVSS score of high. The flaw allows attackers to compromise administrator sessions without authentication and was officially patched on December 9, 2025, with the release of Ivanti EPM 2024 SU4 SR1. Due to the severity and unauthenticated nature of the issue, affected systems face a high risk of complete administrative compromise.

The vulnerability exists in the ‘incomingdata’ web API, which processes device scan data but fails to properly validate or sanitize user-supplied input. An unauthenticated attacker can abuse this weakness by sending crafted POST requests to the ‘/incomingdata/postcgi.exe’ endpoint. Malicious JavaScript payloads can be embedded within device-related fields such as Device ID, Display Name, or OS Name, which are then stored directly in the EPM device database.

Once the malicious data is stored, it is rendered in multiple administrator-facing web dashboard pages, including ‘frameset.aspx’ and ‘db_frameset.aspx’. When an Ivanti EPM administrator accesses these pages during routine operations, the injected JavaScript executes automatically in the browser. This passive user interaction results in full administrator session hijacking, granting attackers complete control over the EPM web interface.

Successful exploitation can have severe organizational impact, as Ivanti EPM is widely used for endpoint management, vulnerability scanning, and remote administration. Attackers gaining administrative access can potentially control managed endpoints, deploy unauthorized software, and manipulate security policies. According to Rapid7, organizations should immediately upgrade to Ivanti EPM 2024 SU4 SR1, as prompt patching is the only effective mitigation against this unauthenticated, high-impact vulnerability.

Impact

  • Gain Access
  • Cross-site Scripting

Indicators of Compromise

CVE

  • CVE-2025-10573

Affected Vendors

Ivanti

Remediation

  • Upgrade Ivanti EPM to version 2024 SU4 SR1 immediately.
  • Restrict access to the EPM web service to trusted networks only.
  • Validate and sanitize any user-supplied input if custom scripts or integrations are used.
  • Monitor administrator dashboards for suspicious device entries or unexpected behavior.
  • Educate administrators about the risk of opening dashboards with unverified device data.
  • Implement web application security controls, such as a Web Application Firewall (WAF), to detect and block XSS attempts.
  • Regularly review and patch all EPM instances to stay protected against known vulnerabilities.