SP1 and prior that, if exploited, could allow an authenticated attacker
(with privileges to create/update annotations or upload media files) to
persist arbitrary JavaScript code that will be executed by users who
were socially engineered to disable content security policy protections
while rendering annotation attachments from within a web browser.
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
AVEVA recommends that organizations evaluate the impact of these vulnerabilities based on their operational environment, architecture, and product implementation. Users of affected product versions should apply security updates to mitigate the risk of exploit. From OSISoft Customer Portal https://my.osisoft.com/ , search for "PI Web API" and select version 2023 SP1 Patch 1 or higher. For additional information please refer to AVEVA-2025-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Vendor Workaround
AVEVA further recommends users follow general defensive measures: * Review and update the file extensions allowlist https://docs.aveva.com/bundle/pi-server-f-af-pse/page/1022248.html * for annotation attachments to remove potentially vulnerable of undesired file types (ex: svg, pdf, ...). * Consider implementing IT policies that would prevent users from subverting/disabling content security policy browser protections. * Inform PI Web API users that annotation attachments should be retrieved through direct REST requests to PI Web API rather than rendering them in the browser interface. * Audit assigned privileges to ensure that only trusted users are given "Annotate" access rights https://docs.aveva.com/bundle/pi-server-f-af-pse/page/1020021.html For additional information please refer to AVEVA-2025-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-18212 | A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were socially engineered to disable content security policy protections while rendering annotation attachments from within a web browser. |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 12 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Jun 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023 SP1 and prior that, if exploited, could allow an authenticated attacker (with privileges to create/update annotations or upload media files) to persist arbitrary JavaScript code that will be executed by users who were socially engineered to disable content security policy protections while rendering annotation attachments from within a web browser. | |
| Title | AVEVA PI Web API Cross-site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-06-12T20:09:34.976Z
Reserved: 2025-03-24T16:30:31.847Z
Link: CVE-2025-2745
Updated: 2025-06-12T20:09:24.567Z
Status : Deferred
Published: 2025-06-12T20:15:21.040
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-2745
No data.
OpenCVE Enrichment
No data.
EUVD