Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns of OpenPLC ScadaBR cross-site scripting vulnerability Exploited in Attacks

Posted on November 29, 2025November 29, 2025 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has formally up to date its Recognized Exploited Vulnerabilities (KEV) catalog to incorporate a vital flaw in OpenPLC ScadaBR, confirming that menace actors are actively weaponizing it within the wild.

The safety defect, recognized as CVE-2021-26829, is a Cross-Website Scripting (XSS) vulnerability rooted within the system_settings.shtm element of ScadaBR. Whereas the vulnerability was first disclosed a number of years in the past, its addition to the KEV catalog on November 28, 2025, alerts a regarding resurgence in exploitation exercise focusing on industrial management environments.

The vulnerability permits a distant attacker to inject arbitrary internet script or HTML by way of the system settings interface. When an administrator or an authenticated consumer navigates to the compromised web page, the malicious script executes inside their browser session.

Categorized below CWE-79 (Improper Neutralization of Enter Throughout Net Web page Era), this flaw poses vital dangers to Operational Know-how (OT) networks.

Profitable exploitation might permit attackers to hijack consumer periods, steal credentials, or modify vital configuration settings inside the SCADA system. Provided that OpenPLC is broadly used for industrial automation analysis and implementation, the assault floor is notable.

CISA indicated that this vulnerability might impression open-source parts, third-party libraries, or proprietary implementations utilized by varied merchandise, making it difficult to totally outline the scope of the menace.

Below Binding Operational Directive (BOD) 22-01, CISA has established a strict remediation timeline for Federal Civilian Govt Department (FCEB) businesses. These businesses are required to safe their networks in opposition to CVE-2021-26829 by December 19, 2025.

Whereas CISA has not presently linked this particular exploit to recognized ransomware campaigns, the company warns that unpatched SCADA methods stay high-value targets for classy menace actors.

Mitigations

Safety groups and community directors are urged to prioritize the next actions:

Apply Mitigations: Implement vendor-supplied patches or configuration adjustments instantly.

Evaluate Third-Occasion Utilization: Decide if the susceptible ScadaBR element is embedded in different instruments inside the community.

Discontinue Use: If mitigations are unavailable or can’t be utilized, CISA advises discontinuing the usage of the product to forestall compromise.

Organizations are inspired to assessment the GitHub pull request for the repair (Scada-LTS/Scada-LTS) for code-level particulars.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, CISA, CrossSite, Exploited, OpenPLC, ScadaBR, Scripting, Vulnerability, Warns

Post navigation

Previous Post: New Albiriox Malware Attacking Android Users to Take Complete Control of their Device
Next Post: CISA Adds Actively Exploited XSS Bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

Related Posts

Critical Apache Tika Core Vulnerability Exploited by Uploading Malicious PDF Cyber Security News
Securing Multi-Cloud Infrastructures in 2025 Enterprise Deployments Cyber Security News
North Korean Hackers Using Malicious Scripts Combining BeaverTail and OtterCookie for Keylogging Cyber Security News
Handala Hackers Targeted Israeli Officials by Compromising Telegram Accounts Cyber Security News
PoC Exploit Released for Critical React, Next.js RCE Vulnerability (CVE-2025-55182) Cyber Security News
Operation Silk Lure Weaponizing Windows Scheduled Tasks to Drop ValleyRAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
  • Windows 11 PCs Fail to Shut Down After January Security Update
  • Cloudflare Acquired Open-source Web Framework Astro to Supercharge Development
  • In Other News: FortiSIEM Flaw Exploited, Sean Plankey Renominated, Russia’s Polish Grid Attack
  • Monnai Raises $12 Million for Identity and Risk Data Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection
  • Windows 11 PCs Fail to Shut Down After January Security Update
  • Cloudflare Acquired Open-source Web Framework Astro to Supercharge Development
  • In Other News: FortiSIEM Flaw Exploited, Sean Plankey Renominated, Russia’s Polish Grid Attack
  • Monnai Raises $12 Million for Identity and Risk Data Infrastructure

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark