AVEVA PI Web API
A content security policy (CSP) bypass vulnerability in PI Web API versions 2023_SP1 and earlier allows an attacker with a valid user account holding Annotate permissions to disable CSP protections. This could enable code injection through malicious annotation attachments. When other users view or download these attachments through the web interface, injected code executes in their browser context, potentially allowing the attacker to harvest credentials, session tokens, or other sensitive data. Successful exploitation requires valid user credentials, user interaction, and navigation to the malicious attachment via the web UI.
- Valid PI Web API user account with Annotate permission
- User must interact with a malicious annotation attachment through the web interface
- Target user's browser must render the attachment without protective CSP headers
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a1e667fd-d65d-43a0-a188-7b23cd93dcb0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.