Description
Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page.
If a benign user with appropriate rights accesses the "Motion Control Diagnostics" parameters page, the malicious code would be executed in the scope of their web session.
Published: 2026-05-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Affected Siemens industrial control devices fail to validate and sanitize the Technology Object name displayed on the Motion Control Diagnostics web page. An attacker who can log in and download a TIA project can inject malicious scripts into that page. When a legitimate user with the same access rights views the page, the embedded code executes within their browser session, potentially allowing the attacker to run arbitrary client‑side scripts and perform actions on behalf of the user.

Affected Systems

Version information is not provided, but the vulnerability affects a broad set of Siemens programmable logic controller families, including SIMATIC Drive Controller CPUs (1504D TF, 1507D TF), numerous SIMATIC ET 200SP models (1510SP‑1, 1512SP‑1, 1514SP‑2, etc.), and the SIMATIC S7‑1500 CPU line (1511, 1512, 1513, 1515, 1516, 1517, 1518 variants). Software controllers and the PLCSIM Advanced environment are also impacted. All affected devices expose the Motion Control Diagnostics page in their web interface.

Risk and Exploitability

The CVSS score of 9.3 indicates critical severity. The attack vector is authenticated via the web interface; the threat requires the attacker to possess credentials that allow project download, which is typically granted to privileged engineering users. Because the injected script runs in the victim’s browser session, it can lead to arbitrary code execution, credential theft, or further compromise of the network. EPSS data is unavailable, and the vulnerability is not yet listed in the CISA Known Exploited Vulnerabilities catalog, but the high score and potential for widespread exposure demand immediate action.

Generated by OpenCVE AI on May 12, 2026 at 10:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied firmware patch or software update to all affected Siemens devices.
  • If a patch is not yet available, limit web‑interface access to trusted networks or disable the Motion Control Diagnostics page for non‑essential users.
  • Implement role‑based access controls so only authorized personnel can download TIA projects and view the diagnostics page, reducing the attack surface.

Generated by OpenCVE AI on May 12, 2026 at 10:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
Title Authenticated XSS Vulnerability in Siemens Motion Control Diagnostics Web Interface

Tue, 12 May 2026 09:30:00 +0000

Type Values Removed Values Added
Description Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page. If a benign user with appropriate rights accesses the "Motion Control Diagnostics" parameters page, the malicious code would be executed in the scope of their web session.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: siemens

Published:

Updated: 2026-05-12T12:44:38.194Z

Reserved: 2026-02-05T19:53:27.492Z

Link: CVE-2026-25787

cve-icon Vulnrichment

Updated: 2026-05-12T12:44:17.354Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T10:16:44.610

Modified: 2026-05-12T14:19:41.400

Link: CVE-2026-25787

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T10:30:13Z

Weaknesses