A cross-site scripting vulnerability exists in AVEVA PI Web API version 2023
SP1 and prior that, if exploited, could allow an authenticated attacker
(with privileges to create/update annotations or upload media files) to
persist arbitrary JavaScript code that will be executed by users who
were socially engineered to disable content security policy protections
while rendering annotation attachments from within a web browser.
AVEVA recommends that organizations evaluate the impact of these
vulnerabilities based on their operational environment, architecture,
and product implementation. Users of affected product versions should
apply security updates to mitigate the risk of exploit.
From OSISoft Customer Portal https://my.osisoft.com/ , search for "PI Web API" and select version 2023 SP1 Patch 1 or higher.
For additional information please refer to AVEVA-2025-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .
Configurations
Workarounds
AVEVA further recommends users follow general defensive measures:
* Review and update the file extensions allowlist https://docs.aveva.com/bundle/pi-server-f-af-pse/page/1022248.html
* for annotation attachments to remove potentially vulnerable of undesired file types (ex: svg, pdf, ...).
* Consider implementing IT policies that would prevent users from
subverting/disabling content security policy browser protections.
* Inform PI Web API users that annotation attachments should be
retrieved through direct REST requests to PI Web API rather than
rendering them in the browser interface.
* Audit assigned privileges to ensure that only trusted users are given "Annotate" access rights https://docs.aveva.com/bundle/pi-server-f-af-pse/page/1020021.html
For additional information please refer to AVEVA-2025-003 https://www.aveva.com/en/support-and-success/cyber-security-updates/ .