Vulnerabilities

CISA Reports Active Exploitation Of OpenPLC and ScadaBR File Upload Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2021-26828 to its Known Exploited Vulnerabilities (KEV) catalog on December 3, 2025, confirming active exploitation in the wild.

This flaw affects OpenPLC ScadaBR, an open-source supervisory control and data acquisition (SCADA) platform used in industrial control systems (ICS) for monitoring and automation.

Federal agencies must apply mitigations by December 24, 2025, or discontinue use under Binding Operational Directive (BOD) 22-01.​

Vulnerability Overview

OpenPLC ScadaBR contains an unrestricted file upload vulnerability, classified as CWE-434.

Remote authenticated users exploit the view_edit.shtm endpoint to upload arbitrary JavaServer Pages (JSP) files, which the server executes directly.

This leads to remote code execution (RCE) with the web application’s privileges, potentially allowing attackers to manipulate ICS processes, steal data, or deploy malware.

The vulnerability carries a CVSS v3.1 base score of 8.8 (High), with attack vector Network (AV: N), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI: N), unchanged scope (S: U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A: H).

It affects OpenPLC ScadaBR versions 0.9.1 and earlier on Linux and 1.12.4 and earlier on Windows; no patches are available for these versions.

ParameterDetails
CVE IDCVE-2021-26828
CVSS Score8.8 (High)
CWECWE-434
Affected VersionsLinux: <=0.9.1; Windows: <=1.12.4
VectorAV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
KEV Date Added2025-12-03; Due: 2025-12-24

​A related flaw, CVE-2021-26829 (XSS via system_settings.shtm, CVSS 5.4-6.5), was added to KEV on November 28, 2025.​

Real-World Exploitation and Mitigation

Security firm Forescout detected exploitation in March 2025 by the pro-Russian hacktivist group TwoNet on honeypots mimicking water treatment facilities.

Attackers used default credentials for initial access, then chained CVE-2021-26828 with an XSS flaw to upload JSP webshells, create rogue users, deface HMIs, delete PLC data sources, turn off logging, and alter setpoints causing operational disruption without full RCE escalation.

Public proof-of-concept exploits exist on GitHub, aiding low-skill attackers.

No vendor patches are available because the project lacks updated, secure versions.

Organizations must inventory ScadaBR instances, segment ICS networks to block admin interfaces, enforce least-privilege access, and monitor for anomalous JSP uploads or HMI changes.

Disable or replace vulnerable software if feasible, especially in critical infrastructure. CISA stresses the appeal of this flaw to ICS threat actors beyond ransomware.

This incident highlights risks in legacy open-source ICS tools, urging swift action to prevent sabotage.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago