WAGO: XSS vulnerability in Web-UI in WAGO 750-88X and WAGO 750-89X
The Web-Based Management (WBM) interface on WAGO 750-88X and 750-89X series PLCs contains a persistent cross-site scripting (XSS) vulnerability in the SNMP configuration page. An attacker can inject malicious JavaScript that executes when authorized users access the SNMP settings, potentially enabling credential theft, unauthorized device configuration changes, or execution of control commands. The vulnerability affects models 750-352, 750-362, 750-363, 750-823, 750-831, 750-832, 750-852, 750-862, 750-880, 750-881, 750-889, 750-890, and 750-891.
- Network access to the WBM HTTP/HTTPS port on the target WAGO PLC (typically port 80 or 443)
- Ability to inject malicious data into the SNMP configuration page fields
- An authorized user must visit the SNMP configuration page for the injected script to execute
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8cab8269-2bbc-4abe-87b2-51ef3db10a8dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.