Home Assistant XSS Vulnerability Patched — Update to 2025.10.2 Now
We have a developing situation. CVE-2025-62172 was disclosed two weeks ago targeting Home Assistant Core — a high-severity stored XSS vulnerability lurking in graph tooltips that could allow attackers to inject malicious scripts through entity names. Wiresec Urgency Scale: 🚨🚨🚨🚨
Here's the battlefield report: Any Home Assistant instance running versions 2025.1.0 through 2025.10.1 is vulnerable. The attack vector is elegant in its simplicity — malicious actors can craft entity names that execute JavaScript when users hover over graph tooltips. In a smart home environment where entity names often come from device discovery or user input, this creates a significant attack surface.
The good news from the trenches: Home Assistant's security team responded with military precision. The vulnerability was disclosed responsibly, and a patch was shipped in version 2025.10.2 within the same release cycle.
What makes this particularly concerning is Home Assistant's role as the central command center for thousands of smart homes. XSS in this context isn't just about stealing cookies — it's about potential access to device controls, automation scripts, and home security systems.
Mission briefing complete. Your orders: - If running 2025.1.0 to 2025.10.1: Update to 2025.10.2 or newer immediately - If running older versions: You're already patched, but consider updating for other fixes - Review entity names for suspicious content as a precaution
Patch Wiresec, reporting from the IoT security front.

