U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-39663

Change History

Initial Analysis by NIST 12/03/2025 3:06:16 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-79
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p10:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p5:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p4:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p3:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p2:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p1:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p34:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p33:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p32:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p31:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p30:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p29:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p28:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p27:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p26:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p25:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p24:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p23:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p22:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:-:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* versions from (including) 2.0.0 up to (excluding) 2.3.0
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p13:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p12:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p11:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p9:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p7:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.4.0:p6:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p38:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p37:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p36:*:*:*:*:*:*
          *cpe:2.3:a:checkmk:checkmk:2.3.0:p35:*:*:*:*:*:*
Added Reference Type

								
							
							
						
CISA-ADP: https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting Types: Exploit, Third Party Advisory
Added Reference Type

								
							
							
						
CVE: http://seclists.org/fulldisclosure/2025/Nov/0 Types: Exploit, Mailing List, Third Party Advisory
Added Reference Type

								
							
							
						
Checkmk GmbH: https://checkmk.com/werk/17998 Types: Vendor Advisory
Added Reference Type

								
							
							
						
Checkmk GmbH: https://github.com/sbaresearch/advisories/tree/82fd27e4570433464c30b35150b197db9a850f4e/2025/SBA-ADV-20250729-01_Checkmk_Cross_Site_Scripting Types: Exploit, Third Party Advisory