SB2025013104 - Multiple vulnerabilities in VMware Aria Operations for Logs



SB2025013104 - Multiple vulnerabilities in VMware Aria Operations for Logs

Published: January 31, 2025

Security Bulletin ID SB2025013104
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2025-22218)

The vulnerability allows a remote user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A remote user with View Only Admin permissions can read the credentials of a VMware product integrated with VMware Aria Operations for Logs.


2) Stored cross-site scripting (CVE-ID: CVE-2025-22219)

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote user can inject and execute arbitrary HTML and script code in administrator's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow an attacker to elevate privileges within the application.


3) Improper privilege management (CVE-ID: CVE-2025-22220)

The vulnerability allows a remote user to escalate privileges within the application.

The vulnerability exists due to improper privilege management. A remote user can perform certain operations in the context of an admin user.


4) Stored cross-site scripting (CVE-ID: CVE-2025-22221)

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote privileged user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.



Remediation

Install update from vendor's website.