Vulnerability Description
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by sending malicious input injected into the server username field of the import preconfiguration action in the API V1 route.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Copeland | Xweb 300D Pro Firmware | <= 1.12.1 |
| Copeland | Xweb 300D Pro | - |
| Copeland | Xweb 500D Pro Firmware | <= 1.12.1 |
| Copeland | Xweb 500D Pro | - |
| Copeland | Xweb 500B Pro Firmware | <= 1.12.1 |
| Copeland | Xweb 500B Pro | - |
Related Weaknesses (CWE)
References
- https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-05Third Party Advisory
- https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdateProduct
- https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10Third Party AdvisoryUS Government Resource
FAQ
What is CVE-2026-23702?
CVE-2026-23702 is a vulnerability with a CVSS score of 8.0 (HIGH). An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by sending malicious input injec...
How severe is CVE-2026-23702?
CVE-2026-23702 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23702?
Check the references section above for vendor advisories and patch information. Affected products include: Copeland Xweb 300D Pro Firmware, Copeland Xweb 300D Pro, Copeland Xweb 500D Pro Firmware, Copeland Xweb 500D Pro, Copeland Xweb 500B Pro Firmware.