Cyber Posture

CVE-2025-24320

High

Published: 05 February 2025

Published
05 February 2025
Modified
21 October 2025
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0085 75.0th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24320 is a high-severity Cross-site Scripting (CWE-79) vulnerability in F5 Big-Ip Access Policy Manager. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 25.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs to the BIG-IP Configuration utility, directly preventing the injection of malicious JavaScript payloads that enable stored XSS.

prevent

SI-15 mandates filtering of information outputs on vulnerable pages, ensuring injected scripts are neutralized before execution in the context of logged-in users.

prevent

SI-2 ensures timely remediation of known flaws like this incomplete fix for CVE-2024-31156 by applying vendor patches from the F5 advisory.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in network-accessible web config utility directly enables exploitation of public-facing applications (T1190) and arbitrary JavaScript execution in victim browser context (T1059.007).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. This vulnerability is due to an incomplete fix for…

more

CVE-2024-31156 https://my.f5.com/manage/s/article/K000138636 . Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Deeper analysisAI

CVE-2025-24320 is a stored cross-site scripting (XSS) vulnerability, associated with CWE-79, affecting an undisclosed page in the F5 BIG-IP Configuration utility. The issue arises from an incomplete fix for the prior vulnerability CVE-2024-31156 and enables an attacker to execute JavaScript in the context of the currently logged-in user. It carries a CVSS v3.1 base score of 8.0 (AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H). Software versions that have reached End of Technical Support (EoTS) are not evaluated for this vulnerability.

Exploitation requires an attacker to have low-privilege (PR:L) authenticated access to the BIG-IP Configuration utility over the network (AV:N). By injecting a malicious payload onto the vulnerable page, the attacker can trigger JavaScript execution when another logged-in user accesses and interacts with the page (UI:R/AC:L). Successful exploitation allows high-impact outcomes, including unauthorized access to confidential data (C:H), modification of system integrity (I:H), and disruption of availability (A:H), such as stealing session cookies or performing actions on behalf of the victim user.

The F5 security advisory at https://my.f5.com/manage/s/article/K000140578 provides details on mitigation, including available patches and any recommended workarounds.

Details

CWE(s)

Affected Products

f5
big-ip access policy manager
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip advanced firewall manager
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip advanced web application firewall
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip analytics
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip application acceleration manager
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip application security manager
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip application visibility and reporting
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip automation toolchain
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip carrier-grade nat
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
f5
big-ip container ingress services
15.1.0 — 15.1.10.6 · 16.1.0 — 16.1.5.2 · 17.1.0 — 17.1.2
+11 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2025-20045Same product: F5 Big-Ip Access Policy Manager
CVE-2025-20058Same product: F5 Big-Ip Access Policy Manager
CVE-2025-21091Same product: F5 Big-Ip Access Policy Manager
CVE-2025-20029Same product: F5 Big-Ip Access Policy Manager
CVE-2025-21087Same product: F5 Big-Ip Access Policy Manager
CVE-2025-23239Same product: F5 Big-Ip Access Policy Manager
CVE-2025-22846Same product: F5 Big-Ip Access Policy Manager
CVE-2025-24497Same product: F5 Big-Ip Policy Enforcement Manager
CVE-2025-53521Same product: F5 Big-Ip Access Policy Manager
CVE-2025-24312Same product: F5 Big-Ip Advanced Firewall Manager

References