CVE-2025-41747: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Phoenix Contact FL SWITCH 2005
An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
AI Analysis
Technical Summary
CVE-2025-41747 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Phoenix Contact FL SWITCH 2005 device's web-based management interface, specifically in the pxc_vlanIntfCfg.php script. The vulnerability arises due to improper neutralization of input during web page generation, allowing an unauthenticated remote attacker to craft a malicious POST request that, when sent to the device, can manipulate parameters accessible through the web management interface. The attack relies on tricking an authenticated user into submitting this manipulated request, thus requiring user interaction but no prior authentication. The vulnerability does not grant access to system-level resources or privileged OS functions; rather, it limits the attacker’s influence to configuration parameters within the web application context. The session cookie is protected by the httpOnly flag, which prevents attackers from stealing session cookies via client-side scripts, thus mitigating session hijacking risks. The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction, and impacting confidentiality, integrity, and availability to a limited extent. No public exploits have been reported yet, but the vulnerability poses a significant risk to the integrity and availability of device configurations, which could disrupt industrial network operations.
Potential Impact
For European organizations, especially those in industrial sectors relying on Phoenix Contact FL SWITCH 2005 devices for critical network infrastructure, this vulnerability could lead to unauthorized changes in network switch configurations. Such changes might degrade network performance, cause denial of service, or open pathways for further attacks within operational technology (OT) environments. Although the vulnerability does not allow direct system-level compromise, manipulation of device parameters can impact network segmentation, VLAN configurations, or access controls, potentially exposing sensitive industrial control systems. Given the widespread use of Phoenix Contact products in European manufacturing, energy, and infrastructure sectors, the impact could be significant, disrupting industrial processes and causing operational downtime. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing the risk in environments with less security awareness or insufficient user training.
Mitigation Recommendations
Organizations should immediately verify if they use Phoenix Contact FL SWITCH 2005 devices and monitor vendor communications for patches or firmware updates addressing CVE-2025-41747. In the absence of patches, network administrators should restrict access to the web management interface to trusted management networks only, employing network segmentation and firewall rules to block unauthorized access. Implement strict access controls and multi-factor authentication for device management interfaces to reduce the risk of user interaction exploitation. Security awareness training should emphasize phishing and social engineering risks to prevent users from submitting malicious requests. Additionally, enable logging and monitoring of management interface activities to detect anomalous configuration changes. Consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking malicious POST requests targeting the vulnerable endpoint. Regularly audit device configurations to identify unauthorized changes promptly.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Poland, Sweden
CVE-2025-41747: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Phoenix Contact FL SWITCH 2005
Description
An XSS vulnerability in pxc_vlanIntfCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to send a manipulated POST request to the device in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
AI-Powered Analysis
Technical Analysis
CVE-2025-41747 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the Phoenix Contact FL SWITCH 2005 device's web-based management interface, specifically in the pxc_vlanIntfCfg.php script. The vulnerability arises due to improper neutralization of input during web page generation, allowing an unauthenticated remote attacker to craft a malicious POST request that, when sent to the device, can manipulate parameters accessible through the web management interface. The attack relies on tricking an authenticated user into submitting this manipulated request, thus requiring user interaction but no prior authentication. The vulnerability does not grant access to system-level resources or privileged OS functions; rather, it limits the attacker’s influence to configuration parameters within the web application context. The session cookie is protected by the httpOnly flag, which prevents attackers from stealing session cookies via client-side scripts, thus mitigating session hijacking risks. The CVSS v3.1 base score is 7.1, reflecting a high severity due to network attack vector, low attack complexity, no privileges required, but requiring user interaction, and impacting confidentiality, integrity, and availability to a limited extent. No public exploits have been reported yet, but the vulnerability poses a significant risk to the integrity and availability of device configurations, which could disrupt industrial network operations.
Potential Impact
For European organizations, especially those in industrial sectors relying on Phoenix Contact FL SWITCH 2005 devices for critical network infrastructure, this vulnerability could lead to unauthorized changes in network switch configurations. Such changes might degrade network performance, cause denial of service, or open pathways for further attacks within operational technology (OT) environments. Although the vulnerability does not allow direct system-level compromise, manipulation of device parameters can impact network segmentation, VLAN configurations, or access controls, potentially exposing sensitive industrial control systems. Given the widespread use of Phoenix Contact products in European manufacturing, energy, and infrastructure sectors, the impact could be significant, disrupting industrial processes and causing operational downtime. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to exploit this vulnerability, increasing the risk in environments with less security awareness or insufficient user training.
Mitigation Recommendations
Organizations should immediately verify if they use Phoenix Contact FL SWITCH 2005 devices and monitor vendor communications for patches or firmware updates addressing CVE-2025-41747. In the absence of patches, network administrators should restrict access to the web management interface to trusted management networks only, employing network segmentation and firewall rules to block unauthorized access. Implement strict access controls and multi-factor authentication for device management interfaces to reduce the risk of user interaction exploitation. Security awareness training should emphasize phishing and social engineering risks to prevent users from submitting malicious requests. Additionally, enable logging and monitoring of management interface activities to detect anomalous configuration changes. Consider deploying web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking malicious POST requests targeting the vulnerable endpoint. Regularly audit device configurations to identify unauthorized changes promptly.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:18:45.758Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6937da90964788758a8a3fe1
Added to database: 12/9/2025, 8:15:12 AM
Last enriched: 12/9/2025, 8:21:19 AM
Last updated: 12/11/2025, 2:12:52 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67720: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Mayuri-Chan pyrofork
MediumCVE-2025-67719: CWE-620: Unverified Password Change in ibexa user
HighCVE-2025-67716: CWE-184: Incomplete List of Disallowed Inputs in auth0 nextjs-auth0
MediumCVE-2025-67511: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in aliasrobotics cai
CriticalCVE-2025-67713: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in miniflux v2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.