Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34080: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Contec Co.,Ltd. CONPROSYS HMI System (CHS)

0
Medium
VulnerabilityCVE-2025-34080cvecve-2025-34080cwe-79
Published: Tue Jul 01 2025 (07/01/2025, 17:51:53 UTC)
Source: CVE Database V5
Vendor/Project: Contec Co.,Ltd.
Product: CONPROSYS HMI System (CHS)

Description

The Contec Co.,Ltd. CONPROSYS HMI System (CHS) is vulnerable to Cross-Site Scripting (XSS) in the getqsetting.php functionality that could allow reflected execution of scripts in the browser on interaction.This issue affects CONPROSYS HMI System (CHS): before 3.7.7.

AI-Powered Analysis

AILast updated: 11/04/2025, 23:27:10 UTC

Technical Analysis

CVE-2025-34080 identifies a reflected Cross-Site Scripting (XSS) vulnerability in the Contec Co.,Ltd. CONPROSYS HMI System (CHS), specifically in the getqsetting.php functionality. This vulnerability arises from improper neutralization of user-supplied input during web page generation, classified under CWE-79. When a user interacts with the affected functionality, malicious scripts embedded in crafted URLs or inputs can be executed in the victim's browser context. This reflected XSS does not require authentication or privileges, making it accessible to unauthenticated remote attackers. The vulnerability affects versions prior to 3.7.7 of the CHS product. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but requires user interaction (UI:A). The impact does not affect confidentiality, integrity, or availability directly but can lead to indirect consequences such as session hijacking, credential theft, or unauthorized actions performed via the victim's browser session. No known public exploits exist yet, but the vulnerability is publicly disclosed and should be addressed promptly. The lack of a patch link suggests that a fix may be pending or users need to upgrade to version 3.7.7 or later where the issue is resolved.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors using the CONPROSYS HMI System, this vulnerability poses a risk of client-side script execution leading to session hijacking, phishing, or unauthorized control actions within the HMI interface. Such impacts could disrupt operational technology (OT) environments, potentially causing safety risks or production downtime. Although the vulnerability does not directly compromise system confidentiality, integrity, or availability, the indirect effects of successful XSS attacks can undermine trust in the HMI system and lead to broader security incidents. The requirement for user interaction limits mass exploitation but targeted spear-phishing or social engineering attacks could be effective. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize disclosed vulnerabilities over time.

Mitigation Recommendations

1. Upgrade the CONPROSYS HMI System to version 3.7.7 or later where the vulnerability is fixed. 2. If immediate upgrade is not possible, implement web application firewall (WAF) rules to detect and block malicious input patterns targeting getqsetting.php. 3. Employ strict input validation and output encoding on all user-controllable inputs within the HMI web interface to prevent script injection. 4. Educate users and operators about the risks of clicking on suspicious links or interacting with untrusted content related to the HMI system. 5. Monitor web server logs for unusual requests to getqsetting.php that may indicate attempted exploitation. 6. Segment the HMI system network to limit exposure to external networks and reduce attack surface. 7. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the HMI system. 8. Regularly audit and update all industrial control system components to maintain security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.550Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68642ee56f40f0eb72905145

Added to database: 7/1/2025, 6:54:29 PM

Last enriched: 11/4/2025, 11:27:10 PM

Last updated: 11/21/2025, 6:19:25 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats