due to the absence of proper CSRF validation. This issue allows an
unauthenticated attacker to trick a logged-in administrator into
visiting a maliciously crafted link, potentially enabling unauthorized
modification of PLC settings or the upload of malicious programs which
could lead to significant disruption or damage to connected systems.
No advisories yet.
Solution
Pull request #310 resolves this issue. Users are advised to update OpenPLC_V3 to pull request #310 or later from the main GitHub repository https://github.com/thiagoralves/OpenPLC_v3 .
Workaround
No workaround given by the vendor.
Mon, 15 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 14 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openplcproject
Openplcproject openplc V3 |
|
| Vendors & Products |
Openplcproject
Openplcproject openplc V3 |
Sat, 13 Dec 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenPLC_V3 is vulnerable to a cross-site request forgery (CSRF) attack due to the absence of proper CSRF validation. This issue allows an unauthenticated attacker to trick a logged-in administrator into visiting a maliciously crafted link, potentially enabling unauthorized modification of PLC settings or the upload of malicious programs which could lead to significant disruption or damage to connected systems. | |
| Title | OpenPLC_V3 Cross-Site Request Forgery | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-15T15:36:00.538Z
Reserved: 2025-12-03T15:51:35.155Z
Link: CVE-2025-13970
Updated: 2025-12-15T15:35:53.154Z
Status : Awaiting Analysis
Published: 2025-12-13T01:15:51.733
Modified: 2025-12-15T18:22:40.637
Link: CVE-2025-13970
No data.
OpenCVE Enrichment
Updated: 2025-12-14T21:14:52Z