Skip to main content

CVE-2025-52546: CWE-434 Unrestricted Upload of File with Dangerous Type in Copeland LP E3 Supervisory Control

Medium
VulnerabilityCVE-2025-52546cvecve-2025-52546cwe-434
Published: Tue Sep 02 2025 (09/02/2025, 11:25:39 UTC)
Source: CVE Database V5
Vendor/Project: Copeland LP
Product: E3 Supervisory Control

Description

E3 Site Supervisor Control (firmware version < 2.31F01) has a floor plan feature that allows for an unauthenticated attacker to upload floor plan files. By uploading a specially crafted floor plan file, an attacker can inject a stored XSS to the floorplan web page.

AI-Powered Analysis

AILast updated: 09/02/2025, 11:49:35 UTC

Technical Analysis

CVE-2025-52546 is a medium-severity vulnerability affecting Copeland LP's E3 Supervisory Control system, specifically firmware versions prior to 2.31F01. The vulnerability arises from an unrestricted file upload flaw (CWE-434) in the floor plan feature of the system. This feature allows unauthenticated attackers to upload floor plan files without proper validation or restrictions on file types. By uploading a specially crafted floor plan file, an attacker can inject stored Cross-Site Scripting (XSS) payloads into the floor plan web page. Stored XSS occurs when malicious scripts are permanently stored on the target server and executed in the context of users accessing the affected page. In this case, the vulnerability does not require authentication, which significantly lowers the barrier for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is required (UI:A), and low impact on confidentiality and integrity but no impact on availability. The vulnerability allows attackers to execute arbitrary JavaScript in the context of the victim's browser when viewing the floor plan page, potentially leading to session hijacking, credential theft, or further exploitation of the internal network if administrative users are targeted. Although no known exploits are currently in the wild, the vulnerability's presence in supervisory control firmware used in building management or industrial environments raises concerns about potential lateral movement or disruption if exploited. The lack of available patches at the time of publication means affected organizations must rely on mitigation strategies until updates are released.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial control systems that utilize Copeland LP's E3 Supervisory Control, this vulnerability poses a risk of unauthorized access and compromise of supervisory control interfaces. Exploitation could lead to theft of sensitive operational data, manipulation of control interfaces, or use of the compromised system as a pivot point for broader network intrusion. The stored XSS could be leveraged to target facility managers or operators who access the floor plan web page, potentially enabling attackers to steal credentials or deploy further malware. Given the supervisory control context, any compromise could indirectly affect operational integrity and safety, although direct control system manipulation is not indicated by this vulnerability alone. The unauthenticated nature of the exploit increases risk, as attackers do not need valid credentials to attempt exploitation. European organizations with deployments in sectors such as manufacturing, building automation, or energy management should be particularly vigilant. The medium CVSS score reflects moderate risk, but the potential for cascading effects in critical environments elevates the importance of timely mitigation.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the E3 Supervisory Control web interface, ideally limiting it to trusted internal networks and VPN access only, to reduce exposure to unauthenticated attackers. 2. Implement web application firewalls (WAFs) with rules designed to detect and block malicious file uploads and XSS payloads targeting the floor plan upload functionality. 3. Monitor logs and network traffic for unusual upload activity or access patterns to the floor plan feature, enabling early detection of exploitation attempts. 4. Educate users and administrators about the risks of interacting with untrusted floor plan files and encourage cautious behavior when accessing the web interface. 5. Coordinate with Copeland LP for timely firmware updates or patches addressing this vulnerability and plan for prompt deployment once available. 6. Consider deploying Content Security Policy (CSP) headers on the web interface to mitigate the impact of XSS by restricting script execution sources. 7. If possible, disable the floor plan upload feature temporarily until a patch is applied or additional controls are in place.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Armis
Date Reserved
2025-06-17T17:29:21.841Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b6d5e8ad5a09ad00dbf8f9

Added to database: 9/2/2025, 11:32:56 AM

Last enriched: 9/2/2025, 11:49:35 AM

Last updated: 9/2/2025, 2:58:48 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats