PatchSiren cyber security CVE debrief
CVE-2025-7783 Siemens CVE debrief
CVE-2025-7783 is a high-severity issue published on 2026-03-10 and republished by CISA on 2026-03-12 in the Siemens SIDIS Prime advisory (ICSA-26-071-03). The advisory states that insufficiently random values in the form-data component can allow HTTP Parameter Pollution (HPP). Siemens’ remediation is to update SIDIS Prime to V4.0.800 or later. Because the affected component is a software dependency and the advisory provides version ranges, organizations should prioritize inventorying impacted deployments and validating whether any included form-data versions fall below the fixed releases.
- Vendor
- Siemens
- Product
- SIDIS Prime
- CVSS
- HIGH 8.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-03-10
- Original CVE updated
- 2026-03-12
- Advisory published
- 2026-03-10
- Advisory updated
- 2026-03-12
Who should care
Security teams responsible for Siemens SIDIS Prime deployments, OT/ICS asset owners, application teams maintaining Node.js dependencies, and vulnerability management staff tracking third-party library exposure.
Technical summary
The advisory attributes the issue to insufficiently random values in form-data, associated with lib/form_data.Js, and says it affects form-data versions < 2.5.4, 3.0.0-3.0.3, and 4.0.0-4.0.3. The reported impact is HTTP Parameter Pollution (HPP). The supplied CVSS vector is CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N, with a score of 8.7 (High). The remediation listed in the CSAF data is to update to V4.0.800 or later.
Defensive priority
High. The advisory assigns a high CVSS score and the issue can affect network-exposed applications through a dependency weakness, so inventory and remediation should be handled promptly.
Recommended defensive actions
- Confirm whether Siemens SIDIS Prime deployments include the affected form-data versions or affected bundled components.
- Update to V4.0.800 or later, as listed in the vendor remediation.
- If immediate upgrade is not possible, isolate or restrict access to affected services and monitor for unexpected parameter-handling behavior.
- Review dependency management and SBOM records so third-party libraries are tracked for future advisories.
- Validate with Siemens and CISA advisory references before making change-window decisions in production environments.
Evidence notes
This debrief is based on the supplied CISA CSAF source item for ICSA-26-071-03, which references Siemens ProductCERT advisory SSA-485750 and lists the affected product as Siemens SIDIS Prime vers:intdot/<4.0.800. The advisory text explicitly states: 'Use of Insufficiently Random Values vulnerability in form-data allows HTTP Parameter Pollution (HPP).' The published date is taken from the CVE/source item metadata (2026-03-10), and the modified date from the same metadata (2026-03-12) with a revision note indicating CISA republication of the Siemens advisory.
Official resources
-
CVE-2025-7783 CVE record
CVE.org
-
CVE-2025-7783 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Public advisory based on CISA and Siemens ProductCERT CSAF sources; no exploit code or reproduction guidance included.