Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks

Posted on November 29, 2025November 29, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has formally up to date its Recognized Exploited Vulnerabilities (KEV) catalog to incorporate a vital flaw in OpenPLC ScadaBR, confirming that menace actors are actively weaponizing it within the wild.

The safety defect, recognized as CVE-2021-26829, is a Cross-Website Scripting (XSS) vulnerability rooted within the system_settings.shtm element of ScadaBR. Whereas the vulnerability was first disclosed a number of years in the past, its addition to the KEV catalog on November 28, 2025, alerts a regarding resurgence in exploitation exercise focusing on industrial management environments.

The vulnerability permits a distant attacker to inject arbitrary internet script or HTML by way of the system settings interface. When an administrator or an authenticated consumer navigates to the compromised web page, the malicious script executes inside their browser session.

Categorized below CWE-79 (Improper Neutralization of Enter Throughout Net Web page Era), this flaw poses vital dangers to Operational Know-how (OT) networks.

Profitable exploitation might permit attackers to hijack consumer periods, steal credentials, or modify vital configuration settings inside the SCADA system. Provided that OpenPLC is broadly used for industrial automation analysis and implementation, the assault floor is notable.

CISA indicated that this vulnerability might impression open-source parts, third-party libraries, or proprietary implementations utilized by varied merchandise, making it difficult to totally outline the scope of the menace.

Below Binding Operational Directive (BOD) 22-01, CISA has established a strict remediation timeline for Federal Civilian Govt Department (FCEB) businesses. These businesses are required to safe their networks in opposition to CVE-2021-26829 by December 19, 2025.

Whereas CISA has not presently linked this particular exploit to recognized ransomware campaigns, the company warns that unpatched SCADA methods stay high-value targets for classy menace actors.

Mitigations

Safety groups and community directors are urged to prioritize the next actions:

Apply Mitigations: Implement vendor-supplied patches or configuration adjustments instantly.

Evaluate Third-Occasion Utilization: Decide if the susceptible ScadaBR element is embedded in different instruments inside the community.

Discontinue Use: If mitigations are unavailable or can’t be utilized, CISA advises discontinuing the usage of the product to forestall compromise.

Organizations are inspired to assessment the GitHub pull request for the repair (Scada-LTS/Scada-LTS) for code-level particulars.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, CISA, CrossSite, Exploited, OpenPLC, ScadaBR, Scripting, Vulnerability, Warns

Post navigation

Previous Post: New Albiriox Malware Attacking Android Users to Take Complete Control of their Device

Related Posts

Hackers Accessed Customer Data From Salesforce Cyber Security News
Hackers Exploiting RMM Tools LogMeIn and PDQ Connect to Deploy Malware as a Normal Program Cyber Security News
Chinese Cybersecurity Firm Data Breach Exposes State-Sponsored Hackers Cyber Weapons and Target List Cyber Security News
GLOBAL GROUP RaaS Operators Enable AI-driven Negotiation Functionality Cyber Security News
Researchers Bypassed Web Application Firewall With JS Injection with Parameter Pollution Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks
  • New Albiriox Malware Attacking Android Users to Take Complete Control of their Device
  • Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload
  • French Football Federation Reports Data Breach
  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks
  • New Albiriox Malware Attacking Android Users to Take Complete Control of their Device
  • Beware of Weaponized Google Meet page that uses ClickFix to deliver Malicious Payload
  • French Football Federation Reports Data Breach
  • Legacy Python Bootstrap Scripts Create Domain-Takeover Risk in Multiple PyPI Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark