CVE-2026-20742
Published: 27 February 2026
Description
An OS command injection vulnerability exists in XWEB Pro version 1.12.1 and prior, enabling an authenticated attacker to achieve remote code execution on the system by injecting malicious input into requests sent to the templates route.
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents OS command injection by validating and sanitizing malicious inputs to the templates route.
Addresses the vulnerability through timely patching and flaw remediation as recommended in the vendor update and CISA advisory.
Enforces least privilege to restrict high-privilege access required for authenticated attackers to exploit the templates route.
Security SummaryAI
CVE-2026-20742 is an OS command injection vulnerability (CWE-78) present in XWEB Pro version 1.12.1 and prior. Published on 2026-02-27, it affects the templates route, where malicious input can be injected into requests, enabling remote code execution on the system. The vulnerability carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
An authenticated attacker with high privileges can exploit this vulnerability remotely over the network. Exploitation requires high attack complexity but no user interaction, allowing the attacker to inject OS commands via crafted requests to the templates route. Successful exploitation achieves remote code execution with high impacts on confidentiality, integrity, availability, and a change in scope.
Advisories and mitigation details are provided in CISA ICS Advisory ICSA-26-057-10 (https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-10), the corresponding CSAF JSON file (https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-057-10.json), and Copeland's system software update page (https://webapps.copeland.com/Dixell/Pages/SystemSoftwareUpdate).
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection vulnerability in web application templates route enables exploitation of public-facing application (T1190) for remote code execution via command and scripting interpreter abuse (T1059).