CVE-2025-41746: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Phoenix Contact FL SWITCH 2005
An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
AI Analysis
Technical Summary
CVE-2025-41746 is a cross-site scripting vulnerability classified under CWE-79, found in the Phoenix Contact FL SWITCH 2005 device's web-based management interface, specifically in the pxc_portSecCfg.php component. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker to inject malicious scripts. An unauthenticated remote attacker can exploit this by tricking an authenticated user into submitting a manipulated POST request, which alters configuration parameters exposed via the web interface. The vulnerability does not permit access to operating system internals or privileged functions, limiting impact to the web application's configuration context. The session cookie is protected with the httpOnly flag, preventing session hijacking through script access. The CVSS v3.1 score is 7.1 (high), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to device configuration integrity and network stability, especially in industrial environments where these switches are deployed. The lack of available patches at the time of publication necessitates immediate mitigation efforts.
Potential Impact
For European organizations, particularly those in industrial, manufacturing, energy, and critical infrastructure sectors relying on Phoenix Contact FL SWITCH 2005 devices, this vulnerability could lead to unauthorized changes in network switch configurations. Such changes might degrade network performance, create security gaps, or disrupt operational technology (OT) environments. While the vulnerability does not allow full system compromise or session hijacking, the ability to alter device parameters remotely can facilitate further attacks or cause denial of service conditions. Given the strategic importance of industrial control systems in Europe, exploitation could have cascading effects on production lines, utilities, or transportation networks. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with less stringent user security awareness or where phishing campaigns could be used to induce the necessary interaction.
Mitigation Recommendations
1. Immediately restrict access to the web-based management interface of FL SWITCH 2005 devices to trusted networks and users only, using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all user-supplied data in the management interface, if possible via configuration or vendor updates. 3. Educate users about the risks of interacting with unsolicited or suspicious links or requests that could trigger malicious POST submissions. 4. Monitor device configuration changes and logs for unusual or unauthorized modifications to detect potential exploitation attempts early. 5. Apply any vendor-released patches or firmware updates as soon as they become available. 6. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block XSS attack patterns targeting these devices. 7. Use multi-factor authentication and strong password policies for accessing device management interfaces to reduce risk if user credentials are compromised. 8. Regularly audit and update device firmware and configurations to maintain security hygiene.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Czech Republic, Sweden, Spain
CVE-2025-41746: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Phoenix Contact FL SWITCH 2005
Description
An XSS vulnerability in pxc_portSecCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
AI-Powered Analysis
Technical Analysis
CVE-2025-41746 is a cross-site scripting vulnerability classified under CWE-79, found in the Phoenix Contact FL SWITCH 2005 device's web-based management interface, specifically in the pxc_portSecCfg.php component. The vulnerability arises from improper neutralization of input during web page generation, allowing an attacker to inject malicious scripts. An unauthenticated remote attacker can exploit this by tricking an authenticated user into submitting a manipulated POST request, which alters configuration parameters exposed via the web interface. The vulnerability does not permit access to operating system internals or privileged functions, limiting impact to the web application's configuration context. The session cookie is protected with the httpOnly flag, preventing session hijacking through script access. The CVSS v3.1 score is 7.1 (high), reflecting network attack vector, low attack complexity, no privileges required, user interaction required, and impacts on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to device configuration integrity and network stability, especially in industrial environments where these switches are deployed. The lack of available patches at the time of publication necessitates immediate mitigation efforts.
Potential Impact
For European organizations, particularly those in industrial, manufacturing, energy, and critical infrastructure sectors relying on Phoenix Contact FL SWITCH 2005 devices, this vulnerability could lead to unauthorized changes in network switch configurations. Such changes might degrade network performance, create security gaps, or disrupt operational technology (OT) environments. While the vulnerability does not allow full system compromise or session hijacking, the ability to alter device parameters remotely can facilitate further attacks or cause denial of service conditions. Given the strategic importance of industrial control systems in Europe, exploitation could have cascading effects on production lines, utilities, or transportation networks. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with less stringent user security awareness or where phishing campaigns could be used to induce the necessary interaction.
Mitigation Recommendations
1. Immediately restrict access to the web-based management interface of FL SWITCH 2005 devices to trusted networks and users only, using network segmentation and firewall rules. 2. Implement strict input validation and sanitization on all user-supplied data in the management interface, if possible via configuration or vendor updates. 3. Educate users about the risks of interacting with unsolicited or suspicious links or requests that could trigger malicious POST submissions. 4. Monitor device configuration changes and logs for unusual or unauthorized modifications to detect potential exploitation attempts early. 5. Apply any vendor-released patches or firmware updates as soon as they become available. 6. Consider deploying web application firewalls (WAFs) or intrusion prevention systems (IPS) that can detect and block XSS attack patterns targeting these devices. 7. Use multi-factor authentication and strong password policies for accessing device management interfaces to reduce risk if user credentials are compromised. 8. Regularly audit and update device firmware and configurations to maintain security hygiene.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.758Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6937da90964788758a8a3fde
Added to database: 12/9/2025, 8:15:12 AM
Last enriched: 12/9/2025, 8:21:42 AM
Last updated: 12/11/2025, 2:47:58 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13764: CWE-269 Improper Privilege Management in ApusTheme WP CarDealer
CriticalCVE-2025-11467: CWE-918 Server-Side Request Forgery (SSRF) in themeisle RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator
MediumCVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighCVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.