CVE-2026-24663

Copeland · XWEB Pro

An unauthenticated OS command injection vulnerability in Copeland XWEB Pro allows remote code execution via a crafted request to the libraries installation route.

Executive summary

Unauthenticated OS command injection in Copeland XWEB Pro allows remote attackers to execute arbitrary commands, leading to complete system takeover.

Vulnerability

The vulnerability exists in the libraries installation route. An unauthenticated attacker can send a crafted HTTP request with malicious input in the request body, which is then executed by the operating system.

Business impact

This flaw allows for full Remote Code Execution (RCE) without any user credentials. In an industrial context, this can lead to the manipulation of temperature controls, disabling of alarms, and theft of operational data. The CVSS score of 9.0 highlights the severe risk to the availability and integrity of the affected systems.

Remediation

Immediate Action: Upgrade to the latest version of XWEB Pro (v1.12.2 or higher) to remediate the command injection flaw.

Proactive Monitoring: Monitor web server logs for suspicious POST requests targeting the library installation routes and audit for new, unexpected processes.

Compensating Controls: Utilize a Web Application Firewall (WAF) to filter for command injection payloads (e.g., semicolons, backticks, pipes) in the request body.

Exploitation status

Public Exploit Available: No

Analyst recommendation

The ability to execute OS commands remotely and without authentication is a critical security failure. Administrators must apply the vendor-provided update immediately to protect their operational technology (OT) environment.