Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13902: CWE-79 Improper neutralization of input during web page generation ('cross-site scripting') in Schneider Electric Modicon Controllers M241/M251

0
Medium
VulnerabilityCVE-2025-13902cvecve-2025-13902cwe-79
Published: Tue Mar 10 2026 (03/10/2026, 17:06:00 UTC)
Source: CVE Database V5
Vendor/Project: Schneider Electric
Product: Modicon Controllers M241/M251

Description

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause condition where authenticated attackers can have a victim’s browser run arbitrary JavaScript when the victim hovers over a maliciously crafted element on a web server containing the injected payload.

AI-Powered Analysis

AILast updated: 03/10/2026, 18:32:12 UTC

Technical Analysis

CVE-2025-13902 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in Schneider Electric Modicon Controllers M241 and M251 firmware versions prior to 5.4.13.12. The vulnerability stems from improper neutralization of input during web page generation on the device's embedded web server interface. Authenticated attackers can inject malicious JavaScript payloads into web pages served by the controller. When a victim user, who is authenticated to the controller's web interface, hovers their mouse over a maliciously crafted element containing the injected payload, the browser executes the attacker's JavaScript code. This can lead to session hijacking, unauthorized actions, or information disclosure within the context of the victim's session. The CVSS v4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required beyond authentication, and user interaction required (hovering). The vulnerability does not impact the controller's core control functions directly but compromises the security of the web management interface, which is critical for industrial control system (ICS) security. No public exploits or active exploitation have been reported to date. The vulnerability highlights the importance of secure input handling in embedded web interfaces of ICS devices. Schneider Electric has reserved the CVE and presumably will release patches or mitigations in firmware updates beyond version 5.4.13.12.

Potential Impact

The primary impact of CVE-2025-13902 is on the confidentiality and integrity of the web management sessions of Schneider Electric Modicon M241 and M251 controllers. Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of an authenticated user's browser session, potentially leading to session hijacking, theft of credentials or sensitive configuration data, and unauthorized commands issued via the web interface. This can undermine the security of industrial control systems relying on these controllers, potentially disrupting operational processes or enabling further attacks within the ICS environment. Although the vulnerability does not directly affect the availability or safety functions of the controllers, compromising the management interface can lead to indirect operational risks. The requirement for attacker authentication and user interaction limits the ease of exploitation but does not eliminate risk, especially in environments with multiple users or where social engineering is feasible. Organizations worldwide using these controllers in critical infrastructure sectors such as manufacturing, energy, and utilities could face targeted attacks aiming to gain footholds or disrupt operations.

Mitigation Recommendations

1. Apply firmware updates from Schneider Electric promptly, ensuring all Modicon M241 and M251 controllers run version 5.4.13.12 or later where this vulnerability is addressed. 2. Restrict access to the web management interface to trusted networks and users only, using network segmentation and firewall rules to limit exposure. 3. Implement strong authentication mechanisms and monitor for unusual login or session activity to detect potential misuse. 4. Educate users with access to the controllers on the risks of interacting with suspicious web elements and encourage cautious behavior to reduce the likelihood of triggering malicious payloads. 5. Employ web application firewalls (WAFs) or intrusion detection systems (IDS) capable of detecting and blocking XSS payloads targeting the controller interfaces. 6. Conduct regular security assessments and penetration testing focused on the ICS web interfaces to identify and remediate similar input validation issues. 7. Consider disabling or restricting web interface features that allow user-generated content or input if not essential for operations. 8. Maintain comprehensive logging and alerting on controller access to facilitate rapid incident response if exploitation is suspected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
schneider
Date Reserved
2025-12-02T16:20:41.599Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b05626ea502d3aa87d6870

Added to database: 3/10/2026, 5:34:30 PM

Last enriched: 3/10/2026, 6:32:12 PM

Last updated: 3/13/2026, 12:19:46 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses