CVE-2025-41752 Overview
CVE-2025-41752 is a Cross-Site Scripting (XSS) vulnerability affecting the web-based management (WBM) interface of multiple Phoenix Contact FL SWITCH and FL NAT industrial network devices. The vulnerability exists in the pxc_portSfp.php file and can be exploited by an unauthenticated remote attacker to manipulate device configuration parameters through social engineering attacks.
An attacker can craft a malicious link that, when clicked by an authenticated administrator, executes arbitrary JavaScript in the context of the management interface. While the httpOnly flag on session cookies prevents direct session hijacking, the vulnerability allows attackers to modify device configuration parameters accessible through the web application.
Critical Impact
Unauthenticated attackers can trick authenticated users into unknowingly modifying industrial network device configurations, potentially disrupting critical infrastructure operations.
Affected Products
- Phoenix Contact FL NAT 2008/2208/2304-2GC-2SFP (all firmware versions)
- Phoenix Contact FL SWITCH 2005/2008/2016/2105/2108/2116 series (all firmware versions)
- Phoenix Contact FL SWITCH 2200/2300/2400/2500/2600/2700 series (all firmware versions)
Discovery Timeline
- December 9, 2025 - CVE-2025-41752 published to NVD
- December 19, 2025 - Last updated in NVD database
Technical Details for CVE-2025-41752
Vulnerability Analysis
The vulnerability resides in the pxc_portSfp.php script within the web-based management interface of affected Phoenix Contact industrial switches and NAT devices. This reflected XSS vulnerability occurs due to insufficient input validation and output encoding when processing user-supplied parameters related to SFP port configuration.
The attack requires user interaction—specifically, an authenticated administrator must click on a malicious link crafted by the attacker. Once clicked, the malicious JavaScript executes within the authenticated user's browser session, inheriting their privileges to interact with the device's configuration interface.
While the impact is somewhat limited by the httpOnly flag protecting session cookies (preventing direct session token theft), the attacker can still leverage the vulnerability to modify any device configuration parameters accessible through the web interface. In industrial control system environments, unauthorized configuration changes to network switches can have cascading effects on operational technology (OT) network availability and security.
Root Cause
The root cause is improper input validation in the pxc_portSfp.php script (CWE-79: Improper Neutralization of Input During Web Page Generation). User-supplied input is reflected back to the browser without proper sanitization or output encoding, allowing injection of arbitrary HTML and JavaScript content.
The web application fails to implement adequate input filtering on incoming request parameters and does not apply context-appropriate output encoding when rendering dynamic content, creating the conditions for reflected XSS attacks.
Attack Vector
The attack is network-based and requires no authentication from the attacker. The exploitation flow involves:
- The attacker crafts a malicious URL containing JavaScript payload in a vulnerable parameter of pxc_portSfp.php
- The attacker distributes this link to target administrators through phishing emails, compromised websites, or other social engineering methods
- When an authenticated administrator clicks the link, the malicious script executes in their browser
- The script can then make authenticated requests to modify device configuration settings
The attacker does not gain access to system-level resources or operating system internals. Impact is confined to device configuration parameters available through the web application interface.
Detection Methods for CVE-2025-41752
Indicators of Compromise
- Unusual HTTP requests to pxc_portSfp.php containing JavaScript or HTML tags in URL parameters
- Web server access logs showing requests with encoded script tags (%3Cscript%3E, %3C/script%3E)
- Unexpected configuration changes on FL SWITCH or FL NAT devices without corresponding administrator activity
- Reports from administrators of clicking suspicious links related to switch management
Detection Strategies
- Implement web application firewall (WAF) rules to detect and block XSS payloads in requests to the WBM interface
- Monitor HTTP access logs for requests containing script injection patterns targeting pxc_portSfp.php
- Configure alerting for device configuration changes and correlate with authenticated user sessions
- Deploy network intrusion detection signatures for common XSS attack patterns against industrial control system web interfaces
Monitoring Recommendations
- Enable verbose logging on the WBM interface and forward logs to a centralized SIEM solution
- Implement Content Security Policy (CSP) violation reporting if supported by the device firmware
- Monitor for phishing campaigns targeting organization domains that reference FL SWITCH/NAT management interfaces
- Audit device configuration snapshots regularly to detect unauthorized modifications
How to Mitigate CVE-2025-41752
Immediate Actions Required
- Restrict access to the web-based management interface to trusted network segments only using network segmentation or firewall rules
- Educate administrators about phishing risks and the importance of not clicking untrusted links while authenticated to device management interfaces
- Consider disabling the web-based management interface if alternative management methods (CLI, SNMP) are available
- Implement browser security policies that restrict JavaScript execution from untrusted sources
Patch Information
Phoenix Contact has issued a security advisory for this vulnerability. Affected organizations should consult the CERT@VDE Security Advisory VDE-2025-071 for firmware update information and detailed remediation guidance.
Contact Phoenix Contact support for availability of patched firmware versions for your specific device models. Apply firmware updates during planned maintenance windows following your organization's change management procedures.
Workarounds
- Isolate the web-based management interface on a dedicated management VLAN with strict access controls
- Use a dedicated browser profile or virtual machine for accessing industrial device management interfaces
- Implement network-level access control lists (ACLs) to limit which IP addresses can reach the WBM interface
- Configure reverse proxy with XSS filtering capabilities in front of the WBM interface if direct patching is not immediately possible
# Example firewall rule to restrict WBM access (iptables)
# Replace 192.168.100.0/24 with your management network
iptables -A INPUT -p tcp --dport 443 -s 192.168.100.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
iptables -A INPUT -p tcp --dport 80 -s 192.168.100.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

