Home

Description

OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to the absence of proper CSRF validation. This issue allows an unauthenticated attacker to trick a logged-in administrator into visiting a maliciously crafted link, potentially enabling unauthorized modification of PLC settings or the upload of malicious programs which could lead to significant disruption or damage to connected systems.

PUBLISHED Reserved 2025-12-03 | Published 2025-12-13 | Updated 2025-12-15 | Assigner icscert




HIGH: 8.0CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:H

HIGH: 7.0CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:N/VI:H/VA:H/SC:N/SI:N/SA:H

Problem types

CWE-352

Product status

Default status
unaffected

Any version before pull request #310
affected

Credits

Muhammad Ali and Anthony Marrongelli of University of Central Florida (UCF) reported this vulnerability to CISA. finder

References

github.com/thiagoralves/OpenPLC_v3

www.cisa.gov/news-events/ics-advisories/icsa-25-345-10

github.com/...p/csaf_files/OT/white/2025/icsa-25-345-10.json

cve.org (CVE-2025-13970)

nvd.nist.gov (CVE-2025-13970)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.