CVE-2025-7746
Description
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability exists that could cause an unvalidated data injected by a malicious user potentially leading to modify or read data in a victim’s browser.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in the Schneider ATV 630 web interface allows unauthenticated attackers to execute arbitrary JavaScript in a victim's browser.
Vulnerability
Overview
CVE-2025-7746 is a reflected Cross-Site Scripting (XSS) vulnerability in Schneider Electric's ATV 630 variable speed drive's web interface. The flaw resides in improper neutralization of user-supplied input during web page generation (CWE-79). An attacker can inject arbitrary JavaScript or HTML code into a crafted URL, which is then executed in the context of the victim's browser when the link is visited [1].
Exploitation
The vulnerability is exploitable without authentication, as the attacker only needs to convince a user to click on a specially crafted link. The attacker does not need any prior network access to the device beyond normal web connectivity. The attack vector is network-based and requires user interaction, such as clicking a malicious link sent via email or other means [1].
Impact
Successful exploitation allows the attacker to modify or read data in the victim's browser, potentially including session tokens, page content, or performing actions on behalf of the victim within the web interface of the ATV 630. The CVSS base score is Medium, reflecting the need for user interaction and the typical limitations of reflected XSS [1].
Mitigation
As of the advisory publication date, no firmware fix is available for the ATV 630. The vendor, Schneider Electric, has acknowledged the issue and recommends users restrict network access to the device and follow general security best practices for industrial control systems. Users should monitor Schneider's security notification for future patches [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.