due to the absence of proper CSRF validation. This issue allows an
unauthenticated attacker to trick a logged-in administrator into
visiting a maliciously crafted link, potentially enabling unauthorized
modification of PLC settings or the upload of malicious programs which
could lead to significant disruption or damage to connected systems.
Metrics
Affected Vendors & Products
No advisories yet.
Solution
Pull request #310 resolves this issue. Users are advised to update OpenPLC_V3 to pull request #310 or later from the main GitHub repository https://github.com/thiagoralves/OpenPLC_v3 .
Workaround
No workaround given by the vendor.
Sat, 13 Dec 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to the absence of proper CSRF validation. This issue allows an unauthenticated attacker to trick a logged-in administrator into visiting a maliciously crafted link, potentially enabling unauthorized modification of PLC settings or the upload of malicious programs which could lead to significant disruption or damage to connected systems. | |
| Title | OpenPLC_V3 Cross-Site Request Forgery | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-13T00:03:20.869Z
Reserved: 2025-12-03T15:51:35.155Z
Link: CVE-2025-13970
No data.
Status : Received
Published: 2025-12-13T01:15:51.733
Modified: 2025-12-13T01:15:51.733
Link: CVE-2025-13970
No data.
OpenCVE Enrichment
No data.