CVE-2025-61933
F5 BIG-IP Virtual Edition (tier - best) vulnerability analysis and mitigation

Overview

A reflected cross-site scripting (XSS) vulnerability (CVE-2025-61933) exists in an undisclosed page of BIG-IP APM that allows an attacker to run JavaScript in the context of the targeted logged-out user. The vulnerability was disclosed on October 15, 2025, affecting multiple versions of F5's BIG-IP Access Policy Manager (APM) including versions 16.1.0-16.1.6.1, 17.1.0-17.1.3, 17.5.0-17.5.1.3, and 15.1.0-15.1.10.8 (NVD).

Technical details

The vulnerability has been assigned a CVSS v4.0 base score of 5.1 (Medium) with vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N and CVSS v3.1 base score of 6.1 (Medium) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. The vulnerability is classified as CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (NVD).

Impact

If exploited, this vulnerability allows attackers to execute JavaScript code in the context of logged-out users accessing the affected BIG-IP APM page. The impact is considered medium severity with low confidentiality and integrity impact, while having no direct impact on system availability (NVD).

Mitigation and workarounds

F5 has released patches for affected versions and strongly urges customers to update their BIG-IP software as soon as possible. This recommendation comes as part of F5's October 2025 Quarterly Security Notification and in response to a related security incident. CISA has also issued Emergency Directive 26-01 requiring federal agencies to patch affected systems by October 22, 2025 (Tenable Blog).

Community reactions

The vulnerability disclosure coincides with F5's announcement of a security incident involving a nation-state actor who gained access to their systems and obtained BIG-IP source code. This has elevated the urgency of patching this and other vulnerabilities, leading to CISA issuing Emergency Directive 26-01 for federal agencies (Lansweeper Blog).

Additional resources


SourceThis report was generated using AI

Related F5 BIG-IP Virtual Edition (tier - best) vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-61990HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-61935HIGH8.7
  • F5 BIG-IP Virtual Edition (tier - best)F5 BIG-IP Virtual Edition (tier - best)
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025
CVE-2025-58071HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_domain_name_system
NoYesOct 15, 2025
CVE-2025-61974HIGH8.7
  • F5 BIG-IP Virtual EditionF5 BIG-IP Virtual Edition
  • cpe:2.3:a:f5:big-ip_local_traffic_manager
NoYesOct 15, 2025
CVE-2025-61933MEDIUM5.1
  • F5 BIG-IP Virtual Edition (tier - best)F5 BIG-IP Virtual Edition (tier - best)
  • cpe:2.3:a:f5:big-ip_access_policy_manager
NoYesOct 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management