CISA Adds CVE-2021-26829 to KEV Catalog Amid Russian Hacktivist Exploits

CISA has added CVE-2021-26829, a four-year-old XSS flaw in OpenPLC ScadaBR, to its Known Exploited Vulnerabilities catalog due to active exploitation by pro-Russian hacktivists like TwoNet targeting industrial SCADA systems. This resurgence highlights risks to critical infrastructure, urging immediate patching to prevent session hijacking and disruptions.
CISA Adds CVE-2021-26829 to KEV Catalog Amid Russian Hacktivist Exploits
Written by Victoria Mossi

The Resurrected Flaw: Unpatched XSS Vulnerability Fuels New Wave of Cyber Attacks on Industrial Systems

In the shadowy world of cybersecurity, where outdated software can become a hacker’s playground, a four-year-old vulnerability has roared back to life. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently flagged CVE-2021-26829, a cross-site scripting (XSS) flaw in OpenPLC ScadaBR, as actively exploited by malicious actors. This move adds it to CISA’s Known Exploited Vulnerabilities (KEV) catalog, a list that serves as a stark warning for federal agencies and critical infrastructure operators to patch immediately. The flaw, with a CVSS score of 5.4, affects both Windows and Linux versions of the software through a vulnerable endpoint at system_settings.shtm.

OpenPLC ScadaBR, an open-source supervisory control and data acquisition (SCADA) system used in industrial environments like manufacturing and utilities, has long been a target for its accessibility. The vulnerability allows attackers to inject malicious scripts that execute in users’ browsers, potentially leading to session hijacking or data theft. According to reports, this isn’t a new discovery—it was first identified in 2021—but its exploitation has surged, prompting CISA’s urgent alert. Federal civilian executive branch agencies now face a deadline of December 20, 2025, to remediate or discontinue use of affected systems.

The timing of this addition is no coincidence. Just over a month ago, cybersecurity firm Forescout revealed that a pro-Russian hacktivist group called TwoNet targeted one of its honeypots, mistaking it for a water treatment facility. This incident, detailed in a The Hacker News article, underscores how such flaws are being weaponized in geopolitically motivated attacks. TwoNet’s operation involved reconnaissance and attempted disruption, highlighting the real-world risks to essential services.

Unveiling the Exploitation Chain

Delving deeper, the attack observed by Forescout began with widespread scanning for vulnerable SCADA systems. The group, linked to previous disruptions in Ukraine and elsewhere, used automated tools to probe for weaknesses like CVE-2021-26829. Once identified, the XSS flaw could be exploited to deliver payloads that compromise administrative interfaces, potentially allowing control over industrial processes.

This isn’t isolated. Recent web searches reveal a pattern of similar vulnerabilities being added to CISA’s KEV list. For instance, an article from The Hacker News earlier this year noted five other bugs, including those in Oracle and Microsoft products, requiring patches by November 10, 2025. The rapid inclusion of these flaws points to a growing tempo of exploitation, where attackers leverage known issues faster than organizations can respond.

On X, formerly Twitter, cybersecurity professionals have been buzzing about this trend. Posts from accounts like Cyber Security News highlight CISA’s warnings on related threats, such as an actively exploited WSUS vulnerability (CVE-2025-59287), emphasizing the need for enhanced detection. These discussions, often shared with urgency, reflect a community on high alert, with experts noting how groups like TwoNet blend hacktivism with state-sponsored tactics.

Broader Implications for Industrial Control Systems

The resurgence of CVE-2021-26829 raises alarms about the security of legacy industrial software. OpenPLC ScadaBR versions up to 1.12.4 on Windows and 0.9.1 on Linux are impacted, leaving many installations exposed if not updated. CISA’s KEV catalog, maintained as the authoritative source for exploited vulnerabilities as per their official site, now includes this flaw to prioritize remediation efforts across sectors.

Experts point out that XSS vulnerabilities, while often rated as medium severity, can serve as entry points for more devastating attacks. In SCADA environments, where systems control physical processes like water flow or power distribution, a compromised interface could lead to operational shutdowns or safety hazards. A Red Hot Cyber report warns of widespread scanning by groups like TwoNet, driven by out-of-band application security testing (OAST) operations that amplify detection.

This incident echoes past exploits. For example, CISA recently added a critical Oracle Identity Manager zero-day (CVE-2025-61757) to the KEV, as covered in a Bleeping Computer piece. Agencies are rushing to patch amid reports of zero-day attacks, illustrating how unpatched software becomes a liability in an era of persistent threats.

Geopolitical Shadows and Hacktivist Motivations

The involvement of pro-Russian actors like TwoNet adds a layer of geopolitical intrigue. Forescout’s honeypot deception revealed tactics that mirror those used in hybrid warfare, where cyber operations disrupt civilian infrastructure to sow chaos. This group’s mistaken targeting of a simulated water facility in September 2025 demonstrates the indiscriminate nature of such scans, potentially affecting global utilities.

Drawing from additional web sources, a SecurityWeek analysis confirms exploitation of similar Oracle flaws, urging immediate action. On X, posts from CISA’s official account and influencers like Florian Roth discuss related Cisco zero-days, with emergency directives ordering federal agencies to patch or disconnect vulnerable devices. These insights reveal a pattern: attackers exploit configuration weaknesses in hybrid setups, escalating privileges with alarming ease.

Industry insiders note that the open-source nature of tools like OpenPLC makes them double-edged swords—affordable for small operators but harder to secure without dedicated teams. A post on X from Het Mehta, a bug bounty hunter, lists automated tools like XSStrike for exploiting XSS flaws, underscoring how accessible these attacks have become even to less sophisticated actors.

Mitigation Strategies and Future Defenses

To counter these threats, organizations must adopt rigorous vulnerability management. CISA recommends applying patches promptly, isolating affected systems, and monitoring for anomalous activity. For OpenPLC users, upgrading beyond vulnerable versions is crucial, as is implementing web application firewalls to filter malicious inputs.

Broader lessons emerge from recent alerts. A Cybersecurity News alert on a Google Chrome zero-day highlights the speed of exploitation, with CISA urging patches within days. Similarly, a Bleeping Computer report on a CentOS Web Panel flaw stresses the risks of remote command execution in web interfaces.

Experts advocate for layered defenses, including regular penetration testing and threat intelligence sharing. In the case of TwoNet, Forescout’s report details how the group progressed from scanning to attempted disruption, using tools that exploit XSS for initial footholds. This progression warns of cascading risks in interconnected systems.

Evolving Threats in Critical Sectors

The addition of CVE-2021-26829 to the KEV catalog isn’t just bureaucratic—it’s a call to action amid rising attacks on critical infrastructure. Sectors like healthcare and transportation, already targeted as per a Infosecurity Magazine piece on Cisco flaws, face compounded dangers from unpatched software.

On X, discussions from accounts like blackorbird delve into APT groups’ tactics, such as rapid exploitation of N-day vulnerabilities using tools like SQLMap. These posts, while not conclusive, capture the sentiment of a field where speed is everything—attackers move in hours, while defenders grapple with legacy systems.

Historical parallels abound. CISA’s past advisories, like those on F5 BIG-IP flaws from 2021 and 2020 shared on X by their cyber account, show recurring patterns of remote code execution in network appliances. Today’s threats build on these, with actors refining methods for maximum impact.

Strengthening Resilience Against Persistent Adversaries

As threats evolve, so must defenses. Organizations should integrate KEV monitoring into their security operations, prioritizing high-impact flaws like this XSS issue. Training staff on recognizing phishing attempts, often paired with XSS exploits, adds another layer of protection.

Recent additions to the catalog, such as a five-year-old jQuery XSS flaw flagged in a The Hacker News update, remind us that old vulnerabilities never truly die—they resurface when least expected. Patching deadlines, like February 13, 2025, for that flaw, emphasize urgency.

In industrial settings, adopting zero-trust models could mitigate risks, ensuring no single flaw cascades into catastrophe. With groups like TwoNet active, the stakes are high: a disrupted water plant or power grid isn’t just a technical failure—it’s a societal one.

The Path Forward in a Vulnerable World

Ultimately, the CVE-2021-26829 saga highlights the enduring challenge of securing open-source tools in high-stakes environments. As CISA continues to expand its KEV list, drawing from real-time intelligence, organizations must stay vigilant.

Insights from X posts, such as those analyzing APT35 file leaks, reveal how state-affiliated groups automate exploits, blending XSS with other tactics for persistence. While these social media discussions offer snapshots of current thinking, they underscore the need for collaborative defense.

Looking ahead, fostering a culture of proactive patching and threat hunting will be key. By addressing flaws like this before exploitation escalates, the cybersecurity community can blunt the edge of resurgent threats, safeguarding the systems that underpin modern life.

Subscribe for Updates

CybersecurityUpdate Newsletter

The CybersecurityUpdate Email Newsletter is your essential source for the latest in cybersecurity news, threat intelligence, and risk management strategies. Perfect for IT security professionals and business leaders focused on protecting their organizations.

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us