Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25721: CWE-78 in Copeland Copeland XWEB 300D PRO

0
High
VulnerabilityCVE-2026-25721cvecve-2026-25721cwe-78
Published: Fri Feb 27 2026 (02/27/2026, 00:55:28 UTC)
Source: CVE Database V5
Vendor/Project: Copeland
Product: Copeland XWEB 300D PRO

Description

An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the server username and/or password fields of the restore action in the API V1 route.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 21:38:35 UTC

Technical Analysis

CVE-2026-25721 is an OS command injection vulnerability classified under CWE-78 affecting Copeland XWEB 300D PRO devices running version 1.12.1 and earlier. The flaw exists in the handling of the restore action within the API V1 route, specifically in the processing of server username and password fields. An attacker with authenticated access and high privileges can inject malicious OS commands through these fields, which the system executes, leading to remote code execution (RCE). The vulnerability has a CVSS 3.1 base score of 8.0, indicating high severity, with attack vector network-based, attack complexity high, privileges required high, no user interaction, and scope changed. This means the attacker must have authenticated access with elevated privileges, but once exploited, can compromise the confidentiality, integrity, and availability of the device and potentially the broader network it controls. The vulnerability is particularly critical in industrial control environments where XWEB 300D PRO devices are deployed, as successful exploitation could disrupt operations or cause safety hazards. No public exploits or patches are currently available, increasing the urgency for organizations to implement compensating controls and monitor for suspicious activity. The vulnerability was reserved and published in February 2026 by ICS-CERT, highlighting its relevance to industrial cybersecurity.

Potential Impact

The vulnerability enables remote code execution on critical industrial control devices, potentially allowing attackers to take full control of affected systems. This can lead to unauthorized disclosure of sensitive operational data, manipulation or destruction of system functions, and disruption of industrial processes. The impact extends beyond the device to the operational technology (OT) environment, risking safety incidents, production downtime, and financial losses. Given the high privileges required, exploitation is limited to insiders or attackers who have already breached initial defenses, but the consequences of a successful attack are severe. The lack of patches and known exploits in the wild means organizations may be vulnerable for an extended period, increasing risk exposure. The vulnerability could also be leveraged as a foothold for lateral movement within critical infrastructure networks, amplifying its impact. Overall, the threat poses a significant risk to industrial sectors relying on Copeland XWEB 300D PRO devices, including manufacturing, energy, and utilities.

Mitigation Recommendations

1. Immediately restrict access to the API V1 restore action interface to trusted and authenticated users only, employing network segmentation and strict access controls. 2. Implement multi-factor authentication (MFA) for all users with high privileges to reduce the risk of credential compromise. 3. Monitor logs and network traffic for unusual activity related to the restore API calls, especially anomalous inputs in username and password fields. 4. Employ application-layer firewalls or intrusion detection/prevention systems (IDS/IPS) with rules targeting command injection patterns specific to this vulnerability. 5. Disable or limit the use of the restore action API if it is not essential to operations until a vendor patch is available. 6. Conduct regular security audits and penetration testing focused on authentication mechanisms and input validation in the affected devices. 7. Coordinate with Copeland for timely updates and patches and plan for rapid deployment once available. 8. Educate operational staff about the risks of credential sharing and phishing attacks that could lead to privilege escalation. 9. Consider deploying endpoint detection and response (EDR) solutions capable of detecting suspicious command execution on these devices. 10. Maintain an incident response plan tailored to industrial control system compromises to quickly contain and remediate any exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-02-05T16:47:16.553Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0f2b332ffcdb8a298162b

Added to database: 2/27/2026, 1:26:11 AM

Last enriched: 3/6/2026, 9:38:35 PM

Last updated: 4/13/2026, 9:34:17 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses