Summary
Vulnerabilities have been discovered in the WAGO Device Manager that allow any origin to access the server and set header values, as well as an endpoint that permits read access to the file system. The WAGO Device Manager is a software for configuring and parameterizing single WAGO products, which is included in the firmware. These vulnerabilities could be exploited by attackers to send requests and read server responses through crafted web applications or to access the file system.
Impact
The vulnerabilities in the WAGO Device Manager allow unauthorized access to server resources, data leakage, remote exploitation, and compromise of device integrity. Attackers can exploit these vulnerabilities to access sensitive information, perform malicious actions remotely, and identify additional weaknesses, potentially leading to data breaches and further security issues.
Affected Product(s)
| Model no. | Product name | Affected versions |
|---|---|---|
| 0750-810x/xxxx-xxxx | WAGO Firmware <3.10.11 (FW22 Patch 2) | |
| 0750-811x-xxxx-xxxx | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) | |
| 0751-9x01 | Custom Firmware <04.07.01 (70), WAGO Firmware <04.07.01 (FW29) | |
| 0752-8303/8000-0002 | 0752-8303/8000-0002 | Custom Firmware <04.07.01 (70), WAGO Firmware <04.07.01 (FW29) |
| 0762-420x/8000-000x | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) | |
| 0762-430x/8000-000x | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) | |
| 0762-520x/8000-000x | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) | |
| 0762-530x/8000-000x | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) | |
| 0762-620x/8000-000x | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) | |
| 0762-630x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware <04.07.01 (FW29) | |
| 750-820x-xxx-xxx | WAGO Firmware <3.10.11 (FW22 Patch 2) | |
| 750-821x-xxx-xxx | WAGO Firmware <04.07.01 (FW29), Custom Firmware <04.07.01 (70) |
Vulnerabilities
Expand / Collapse allAn unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system.
A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system’s file structure.
Remediation
Update to Firmware version 04.07.01 (FW29) or 03.10.11 (FW22 Patch 2). For the latest Custom Firmware please contact the WAGO support.
Acknowledgments
WAGO GmbH & Co. KG thanks the following parties for their efforts:
- CERT@VDE for coordination (see https://certvde.com )
Revision History
| Version | Date | Summary |
|---|---|---|
| 1.0.0 | 06/16/2025 12:00 | Initial release. |
| 1.1.0 | 07/04/2025 12:00 | Removed incorrect custom firmware versions. |
| 1.1.1 | 10/07/2025 10:00 | Fixed a typo in the description for CVE-2025-25264 |
| 1.2.0 | 11/21/2025 13:00 | The two CVE descriptions and CVSS scores were edited. |