Description
Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page.
If a benign user with appropriate rights accesses the "communication" parameters page, the malicious code would be executed in the scope of their web session.
Published: 2026-05-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is caused by the failure of Siemens web interfaces to properly validate and escape the PLC or station name that is displayed on the Communication parameters page. An attacker who is authorized to download a TIA project can insert arbitrary JavaScript into the name. When a user with suitable rights opens the page, the injected code executes in that user&#39;s browser session. This XSS can be leveraged to run client‑side script that may exfiltrate credentials, manipulate session cookies, or otherwise act with the privileges of the affected user.

Affected Systems

Affected Siemens devices include the SIMATIC Drive Controllers (CPU 1504D TF, CPU 1507D TF), the SIMATIC ET 200SP family (CPUs 1510SP, 1512SP, 1514SP, 1515SP and their variants), the SIMATIC S7‑1500 controllers (CPUs 1511‑1, 1511C‑1, 1513pro, 1515‑2, 1516‑3, 1518‑4 and related models), the SIMATIC ET 200pro (CPUs 1513PRO, 1516PRO), the SIMATIC S7‑1500 software controllers (various 1507S, 1508S, Linux and advanced PLCSIM variants), and the SIPLUS derivatives of the ET 200SP and S7‑1500 lines.

Risk and Exploitability

The CVSS score of 9.3 indicates a high severity flaw. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, so no large‑scale exploitation has been reported yet. Exploitation requires an authenticated attacker who can download a TIA project; therefore typical attack vectors involve internal users or compromised credentials. Once the script is injected, it runs in the scope of any user that views the page, giving the attacker the capabilities of that user within the web interface.

Generated by OpenCVE AI on May 12, 2026 at 10:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PLC firmware or software to the latest release that fixes the XSS issue (see the Siemens advisory at https://cert-portal.siemens.com/productcert/html/ssa-688146.html).
  • Restrict or disable the download of TIA projects on the web interface for accounts that do not require this privilege, thereby reducing the attack surface.
  • Limit network access to the web interface by placing the devices behind a firewall or VPN and ensuring only authorized personnel can reach it.

Generated by OpenCVE AI on May 12, 2026 at 10:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page. If a benign user with appropriate rights accesses the "communication" parameters page, the malicious code would be executed in the scope of their web session.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-05-12T12:42:40.239Z

Reserved: 2026-02-05T19:53:27.491Z

Link: CVE-2026-25786

cve-icon Vulnrichment

Updated: 2026-05-12T12:42:36.956Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T10:16:44.193

Modified: 2026-05-12T14:19:41.400

Link: CVE-2026-25786

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:30:13Z

Weaknesses