Moxa CVE-2025-1679, CVE-2025-1680: Stored Cross-site Scripting (XSS) and Host Header Injection Vulnerabilities in Ethernet Switch
Two vulnerabilities have been identified in Moxa Ethernet switches: CVE-2025-1679: Stored Cross-Site Scripting (XSS) in the web service. An authenticated administrative attacker can inject malicious scripts that persist across sessions. These scripts execute when other authenticated users interact with the device's web interface, potentially compromising the confidentiality and integrity of subsequent systems that trust the web interface data. CVE-2025-1680: Host Header Injection in the web service. An attacker with administrative privileges can manipulate HTTP Host headers in requests to the affected device. This can be exploited to redirect users, forge links, or conduct phishing attacks.
- Valid administrative credentials for the Moxa Ethernet switch web management interface
- Network access to the switch's web management service (typically HTTP/HTTPS, port 80 or 443)
- For exploitation: the victim (another admin) must access the web interface after the payload is injected
Patching may require device reboot — plan for process interruption
/api/v1/advisories/91fb3afc-856c-4777-87fa-2f1382010aa9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.