CVE-2025-41750Cross-site Scripting in Contact FL NAT 2008

Severity
7.1HIGHNVD
EPSS
0.2%
top 58.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 9
Latest updateDec 18

Description

An XSS vulnerability in pxc_PortCfg.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.7

Affected Packages138 packages

CVEListV5phoenix_contact/fl_nat_20080.0.03.50
CVEListV5phoenix_contact/fl_nat_22080.0.03.50
CVEListV5phoenix_contact/fl_switch_20050.0.03.50
CVEListV5phoenix_contact/fl_switch_20080.0.03.50
CVEListV5phoenix_contact/fl_switch_20160.0.03.50

🔴Vulnerability Details

2
GHSA
GHSA-xcx6-h2fv-4pc2: An XSS vulnerability in pxc_PortCfg2025-12-09
CVEList
Reflected XSS vulnerability in pxc_PortCfg.php2025-12-09

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Phoenix Contact pxc_PortCfg.php port Parameter Cross Site Scripting Attempt (CVE-2025-41750)2025-12-18
CVE-2025-41750 — Cross-site Scripting | cvebase