vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an
authenticated attacker to achieve remote code execution on the system by
injecting malicious input into the server username and/or password
fields of the restore action in the API V1 route.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Copeland
Subscribe
|
No advisories yet.
Solution
Copeland has provided a fix for the vulnerabilities and recommends users update the XWEB Pro to the latest version by going to their software update page https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate in the sections dedicated to the different XWEBPRO models page.
Workaround
No workaround given by the vendor.
Fri, 27 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Copeland xweb 300d Pro
Copeland xweb 300d Pro Firmware Copeland xweb 500b Pro Copeland xweb 500b Pro Firmware Copeland xweb 500d Pro Copeland xweb 500d Pro Firmware |
|
| CPEs | cpe:2.3:h:copeland:xweb_300d_pro:-:*:*:*:*:*:*:* cpe:2.3:h:copeland:xweb_500b_pro:-:*:*:*:*:*:*:* cpe:2.3:h:copeland:xweb_500d_pro:-:*:*:*:*:*:*:* cpe:2.3:o:copeland:xweb_300d_pro_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:copeland:xweb_500b_pro_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:copeland:xweb_500d_pro_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Copeland xweb 300d Pro
Copeland xweb 300d Pro Firmware Copeland xweb 500b Pro Copeland xweb 500b Pro Firmware Copeland xweb 500d Pro Copeland xweb 500d Pro Firmware |
Fri, 27 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Copeland
Copeland copeland Xweb 300d Pro Copeland copeland Xweb 500b Pro Copeland copeland Xweb 500d Pro |
|
| Vendors & Products |
Copeland
Copeland copeland Xweb 300d Pro Copeland copeland Xweb 500b Pro Copeland copeland Xweb 500d Pro |
Fri, 27 Feb 2026 01:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into the server username and/or password fields of the restore action in the API V1 route. | |
| Title | Copeland XWEB and XWEB Pro OS Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-02-27T00:55:28.813Z
Reserved: 2026-02-05T16:47:16.553Z
Link: CVE-2026-25721
No data.
Status : Analyzed
Published: 2026-02-27T02:16:20.170
Modified: 2026-02-27T23:06:02.867
Link: CVE-2026-25721
No data.
OpenCVE Enrichment
Updated: 2026-02-27T09:02:58Z