CVE-2025-3905: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Schneider Electric Modicon Controllers M241/M251
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists impacting PLC system variables that could cause an unvalidated data injected by authenticated malicious user leading to modify or read data in a victim’s browser.
AI Analysis
Technical Summary
CVE-2025-3905 is a medium-severity Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Schneider Electric's Modicon Controllers M241 and M251 prior to version 5.3.12.51. The vulnerability arises from improper neutralization of input during web page generation within the PLC system variables. Specifically, an authenticated malicious user can inject unvalidated data into the web interface of these controllers. When a victim accesses the affected web page, the injected script executes in their browser context, potentially allowing the attacker to read or modify data displayed to the victim. This vulnerability does not require high privileges beyond authentication but does require user interaction (victim visiting the maliciously crafted page). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability (VA:N). The scope is limited (SC:L), and the severity is rated medium with a CVSS score of 5.1. No known exploits are currently reported in the wild. The vulnerability is significant because Modicon M241/M251 controllers are widely used in industrial control systems (ICS) for automation, and exploitation could lead to unauthorized data manipulation or leakage through the web interface, potentially disrupting operational technology (OT) environments or exposing sensitive control data.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, water treatment, and transportation that rely on Schneider Electric Modicon M241/M251 PLCs, this vulnerability poses a risk of unauthorized data exposure and manipulation via the web interface. While the vulnerability requires an authenticated attacker and user interaction, the potential impact includes theft of sensitive operational data, manipulation of displayed information leading to incorrect operational decisions, and erosion of trust in control system integrity. This could result in operational disruptions, safety hazards, or compliance violations under regulations like NIS2 or GDPR if sensitive data is exposed. The medium severity indicates that while the threat is not immediately critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities. European ICS environments often have stringent security requirements, and this vulnerability highlights the need for robust authentication and input validation controls in OT systems.
Mitigation Recommendations
1. Immediate upgrade to Schneider Electric Modicon Controllers M241/M251 firmware version 5.3.12.51 or later, where the vulnerability is patched. 2. Restrict access to the web interface of the controllers to trusted networks only, using network segmentation and firewall rules to limit exposure. 3. Implement strong authentication mechanisms and monitor for unusual login attempts to detect potential malicious authenticated users. 4. Employ web application firewalls (WAF) or intrusion detection systems (IDS) tailored for ICS environments to detect and block XSS payloads targeting the controllers. 5. Conduct regular security audits and penetration tests focusing on the web interfaces of ICS devices to identify and remediate input validation issues. 6. Educate operational staff about the risks of interacting with suspicious links or web pages related to ICS devices to reduce the risk of user interaction exploitation. 7. Monitor vendor advisories for any updates or additional patches and apply them promptly.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland
CVE-2025-3905: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Schneider Electric Modicon Controllers M241/M251
Description
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists impacting PLC system variables that could cause an unvalidated data injected by authenticated malicious user leading to modify or read data in a victim’s browser.
AI-Powered Analysis
Technical Analysis
CVE-2025-3905 is a medium-severity Cross-site Scripting (XSS) vulnerability classified under CWE-79, affecting Schneider Electric's Modicon Controllers M241 and M251 prior to version 5.3.12.51. The vulnerability arises from improper neutralization of input during web page generation within the PLC system variables. Specifically, an authenticated malicious user can inject unvalidated data into the web interface of these controllers. When a victim accesses the affected web page, the injected script executes in their browser context, potentially allowing the attacker to read or modify data displayed to the victim. This vulnerability does not require high privileges beyond authentication but does require user interaction (victim visiting the maliciously crafted page). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and limited impact on confidentiality and integrity (VC:N, VI:L), with no impact on availability (VA:N). The scope is limited (SC:L), and the severity is rated medium with a CVSS score of 5.1. No known exploits are currently reported in the wild. The vulnerability is significant because Modicon M241/M251 controllers are widely used in industrial control systems (ICS) for automation, and exploitation could lead to unauthorized data manipulation or leakage through the web interface, potentially disrupting operational technology (OT) environments or exposing sensitive control data.
Potential Impact
For European organizations, especially those in critical infrastructure sectors such as manufacturing, energy, water treatment, and transportation that rely on Schneider Electric Modicon M241/M251 PLCs, this vulnerability poses a risk of unauthorized data exposure and manipulation via the web interface. While the vulnerability requires an authenticated attacker and user interaction, the potential impact includes theft of sensitive operational data, manipulation of displayed information leading to incorrect operational decisions, and erosion of trust in control system integrity. This could result in operational disruptions, safety hazards, or compliance violations under regulations like NIS2 or GDPR if sensitive data is exposed. The medium severity indicates that while the threat is not immediately critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities. European ICS environments often have stringent security requirements, and this vulnerability highlights the need for robust authentication and input validation controls in OT systems.
Mitigation Recommendations
1. Immediate upgrade to Schneider Electric Modicon Controllers M241/M251 firmware version 5.3.12.51 or later, where the vulnerability is patched. 2. Restrict access to the web interface of the controllers to trusted networks only, using network segmentation and firewall rules to limit exposure. 3. Implement strong authentication mechanisms and monitor for unusual login attempts to detect potential malicious authenticated users. 4. Employ web application firewalls (WAF) or intrusion detection systems (IDS) tailored for ICS environments to detect and block XSS payloads targeting the controllers. 5. Conduct regular security audits and penetration tests focusing on the web interfaces of ICS devices to identify and remediate input validation issues. 6. Educate operational staff about the risks of interacting with suspicious links or web pages related to ICS devices to reduce the risk of user interaction exploitation. 7. Monitor vendor advisories for any updates or additional patches and apply them promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- schneider
- Date Reserved
- 2025-04-23T16:29:08.918Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68487f561b0bd07c3938a496
Added to database: 6/10/2025, 6:54:14 PM
Last enriched: 7/11/2025, 1:01:58 AM
Last updated: 8/7/2025, 4:24:35 PM
Views: 16
Related Threats
CVE-2025-9002: SQL Injection in Surbowl dormitory-management-php
MediumCVE-2025-9001: Stack-based Buffer Overflow in LemonOS
MediumCVE-2025-8867: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in iqonicdesign Graphina – Elementor Charts and Graphs
MediumCVE-2025-8680: CWE-918 Server-Side Request Forgery (SSRF) in bplugins B Slider- Gutenberg Slider Block for WP
MediumCVE-2025-8676: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in bplugins B Slider- Gutenberg Slider Block for WP
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.