An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into the request body sent to the contacts
import route.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json | Third Party Advisory |
| https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-27 01:16
Updated : 2026-02-27 23:12
NVD link : CVE-2026-21389
Mitre link : CVE-2026-21389
CVE.ORG link : CVE-2026-21389
JSON object : View
Products Affected
copeland
- xweb_300d_pro
- xweb_300d_pro_firmware
- xweb_500b_pro_firmware
- xweb_500b_pro
- xweb_500d_pro_firmware
- xweb_500d_pro
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
