CVE-2025-1434
Description
The Spreadsheet view is vulnerable to a XSS attack, where a remote unauthorised attacker can read a limited amount of values or DoS the affected spreadsheet. Disclosure of secrets or other system settings is not affected as well as other spreadsheets still work as expected.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An XSS vulnerability in the Spreadsheet view of Topkapi Webserv2 allows a remote unauthenticated attacker to read limited values or cause DoS on the affected spreadsheet page.
Vulnerability
Overview The vulnerability, identified as CVE-2025-1434, resides in the Spreadsheet view component of Topkapi Webserv2, a feature within the WEBSERV2 component [1][2]. The root cause is insufficient validation of 'text' variables, which can be manipulated to inject malicious scripts when the spreadsheet view is rendered [1][2]. This issue affects all versions of Topkapi Webserv2 up to and including 6.2.5474 [1][2].
Attack
Vector and Prerequisites An attacker with control over a 'text' variable on the industrial network can exploit this flaw, requiring no authentication [1][2]. The attack is launched remotely over the network, but only users whose applications use text-valued variables and display spreadsheet views within Webserv2 are vulnerable [1][2]. The attacker injects a malicious script into the spreadsheet page, which then executes in the context of a legitimate user's session [1][2].
Impact
Successful exploitation enables an unauthenticated remote attacker to read a limited amount of values from the affected spreadsheet or cause a denial of service (DoS) on that specific spreadsheet page [1][2]. The vulnerability does not expose secrets, system settings, or affect other spreadsheets, and the DoS is confined to the targeted page [1][2]. Information disclosure is limited in scope.
Mitigation and
Status The vendor AREAL has addressed this vulnerability in Topkapi Webserv2 version 6.2.5592, which is the first fixed release [1][2]. Users running earlier versions should update to this version or later to remediate the issue [1][2]. For those unable to update, no specific workarounds have been mentioned, but restricting control of 'text' variables within the industrial network can reduce exposure [1][2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.