An OS command injection
vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
sending malicious input injected into the server username field of the
import preconfiguration action in the API V1 route.
References
| Link | Resource |
|---|---|
| https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json | Third Party Advisory |
| https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate | Product |
| https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-27 02:16
Updated : 2026-02-27 23:08
NVD link : CVE-2026-23702
Mitre link : CVE-2026-23702
CVE.ORG link : CVE-2026-23702
JSON object : View
Products Affected
copeland
- xweb_300d_pro
- xweb_300d_pro_firmware
- xweb_500b_pro_firmware
- xweb_500b_pro
- xweb_500d_pro_firmware
- xweb_500d_pro
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
