PatchSiren cyber security CVE debrief
CVE-2025-24297 Growatt CVE debrief
CVE-2025-24297 is a critical flaw in Growatt’s cloud portal caused by missing server-side input validation. CISA’s advisory says attackers can inject malicious JavaScript into users’ personal spaces in the web portal, which aligns with a high-impact web injection/XSS-style issue. The advisory was first published on 2025-04-15 and later revised on 2025-05-06 for typo fixes only. Growatt states the cloud-based vulnerabilities were patched and that no user action is needed, while also recommending standard account and security hygiene.
- Vendor
- Growatt
- Product
- Cloud portal
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-04-15
- Original CVE updated
- 2025-05-06
- Advisory published
- 2025-04-15
- Advisory updated
- 2025-05-06
Who should care
Organizations and individuals using Growatt cloud portal services, especially administrators, installers, and users who manage device settings or account content through the web portal.
Technical summary
CISA’s CSAF advisory identifies the affected product as Growatt cloud portal version <=3.6.0. The stated weakness is a lack of server-side input validation, allowing attackers to inject malicious JavaScript into users’ personal spaces in the portal. The supplied CVSS 3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, reflecting a network-reachable issue with no privileges or user interaction required and potential high confidentiality, integrity, and availability impact. The advisory lists Growatt as the vendor and says the cloud vulnerabilities were patched.
Defensive priority
Immediate. Treat as a critical internet-facing web application issue with the potential for account abuse and content injection; confirm patch status and review portal security controls promptly.
Recommended defensive actions
- Verify that Growatt cloud portal services are on the latest patched version and that automatic updates have completed where applicable.
- Enable strong passwords and multi-factor authentication wherever supported.
- Review portal security settings and follow vendor-recommended best practices.
- Monitor for unusual activity in user accounts and portal content.
- Report any security concerns to [email protected].
- Coordinate with vendors or installers if you manage multiple affected devices or accounts.
Evidence notes
Evidence is drawn from the CISA CSAF advisory ICSA-25-105-04 for CVE-2025-24297, which states the issue is due to lack of server-side input validation and affects Growatt cloud portal <=3.6.0. The advisory was published 2025-04-15 and revised 2025-05-06 with a note indicating typo fixes only. Growatt’s listed remediation says the cloud-based vulnerabilities were patched and no user action is needed.
Official resources
-
CVE-2025-24297 CVE record
CVE.org
-
CVE-2025-24297 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2025-04-15 as ICSA-25-105-04 / CVE-2025-24297. The advisory was revised on 2025-05-06 for typo fixes only.