A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023
SP1 and prior that, if exploited, could allow an authenticated attacker
(with privileges to create/update annotations or upload media files) to
persist arbitrary JavaScript code that will be executed by users who
were socially engineered to disable content security policy protections
while rendering annotation attachments from within a web browser.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-18212 A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were socially engineered to disable content security policy protections while rendering annotation attachments from within a web browser.
Fixes

Solution

AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected product versions should apply security updates to mitigate the risk of exploit. From OSISoft Customer Portal https://my.osisoft.com/ , search for "PI Web API" and select version 2023 SP1 Patch 1 or higher.  For additional information please refer to AVEVA-2025-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .


Workaround

AVEVA further recommends users follow general defensive measures: * Review and update the file extensions allowlist https://docs.aveva.com/bundle/pi-server-f-af-pse/page/1022248.html * for annotation attachments to remove potentially vulnerable of undesired file types (ex: svg, pdf, ...). * Consider implementing IT policies that would prevent users from subverting/disabling content security policy browser protections. * Inform PI Web API users that annotation attachments should be retrieved through direct REST requests to PI Web API rather than rendering them in the browser interface. * Audit assigned privileges to ensure that only trusted users are given "Annotate" access rights https://docs.aveva.com/bundle/pi-server-f-af-pse/page/1020021.html For additional information please refer to AVEVA-2025-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00033}

epss

{'score': 0.00038}


Thu, 12 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Jun 2025 20:00:00 +0000

Type Values Removed Values Added
Description A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were socially engineered to disable content security policy protections while rendering annotation attachments from within a web browser.
Title AVEVA PI Web API Cross-site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}

cvssV4_0

{'score': 4.5, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-06-12T20:09:34.976Z

Reserved: 2025-03-24T16:30:31.847Z

Link: CVE-2025-2745

cve-icon Vulnrichment

Updated: 2025-06-12T20:09:24.567Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-12T20:15:21.040

Modified: 2025-06-16T12:32:18.840

Link: CVE-2025-2745

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.