Back to overview

WAGO: Web-Based Management Cross-Site Scripting

VDE-2022-004
Last update
03/09/2022 08:00
Published at
03/09/2022 08:00
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2022-004
CSAF Document

Summary

The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for administration, commissioning and updates.Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks.

Impact

An attacker needs an authorized login on the device in order to exploit the various configuration pages with malicious scripts. This can be used to install malicious code and to gain access to confidential information on a PC that connects to the WBM after it has been compromised.

Affected Product(s)

Model no. Product name Affected versions
751-9301 Compact Controller 100 Firmware FW16 < FW22
752-8303/8000-002 Edge Controller Firmware FW16 < FW22
750-81xx/xxx-xxx Series PFC100 Firmware FW16 < FW22
750-82xx/xxx-xxx Series PFC200 Firmware FW16 < FW22
762-5xxx Series Touch Panel 600 Advanced Line Firmware FW16 < FW22
762-6xxx Series Touch Panel 600 Marine Line Firmware FW16 < FW22
762-4xxx Series Touch Panel 600 Standard Line Firmware FW16 < FW22

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.

References

Mitigation

Restrict network access to the device
Use strong passwords
Do not directly connect the device to the internet
Disable unused TCP/UDP-ports

Please install upcoming FW-Update, which will be available at end of Q2/2022.

Revision History

Version Date Summary
1 03/09/2022 08:00 Initial revision.