PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-25111 Copeland CVE debrief

CVE-2026-25111 is an authenticated OS command injection issue in Copeland XWEB Pro version 1.12.1 and earlier. According to the CISA advisory, malicious input sent to the restore route can allow remote code execution on the affected system. Copeland says a fix is available and recommends updating XWEB Pro to the latest version.

Vendor
Copeland
Product
XWEB 300D PRO
CVSS
HIGH 8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-02-26
Original CVE updated
2026-02-26
Advisory published
2026-02-26
Advisory updated
2026-02-26

Who should care

Operators and administrators responsible for Copeland XWEB Pro appliances, especially XWEB 300D PRO, XWEB 500D PRO, and XWEB 500B PRO systems running version 1.12.1 or earlier. OT/ICS teams that manage patching, remote access, and device administration should treat this as a priority.

Technical summary

The advisory describes an OS command injection in XWEB Pro that is triggered through requests to the restore route. The attack requires an authenticated attacker and can result in remote code execution on the affected system. The supplied CVSS vector indicates network access, high privileges, no user interaction, and high impact to confidentiality, integrity, and availability.

Defensive priority

High — patch as soon as operationally feasible, with particular attention to OT change-control windows and any exposed management interfaces.

Recommended defensive actions

  • Update XWEB Pro to the latest vendor-recommended version using Copeland’s software update page.
  • If the device has internet access and the environment permits, use the built-in SYSTEM -> Updates | Network update path described by Copeland.
  • Restrict administrative access to trusted users only and review whether the restore functionality is exposed more broadly than necessary.
  • Apply ICS defense-in-depth practices such as network segmentation and limiting access to management services, using the CISA recommended practices linked in the advisory.

Evidence notes

Primary evidence comes from the CISA CSAF advisory ICSA-26-057-10, published 2026-02-26, which states that XWEB Pro version 1.12.1 and prior are affected by an authenticated OS command injection leading to remote code execution through the restore route. The same source lists Copeland remediation guidance to update XWEB Pro to the latest version. The supplied source data also includes SSVCv2/E:N/A:N with timestamp 2026-02-25T07:00:00.000000Z.

Official resources

CISA published advisory ICSA-26-057-10 and the CVE record on 2026-02-26. The supplied data does not indicate KEV listing or known ransomware campaign use. The source notes include SSVCv2/E:N/A:N with a timestamp of 2026-02-25T07:00:00.000Z.