Skip to main content

CVE-2025-10235: Cross Site Scripting in Scada-LTS

Medium
VulnerabilityCVE-2025-10235cvecve-2025-10235
Published: Thu Sep 11 2025 (09/11/2025, 00:32:06 UTC)
Source: CVE Database V5
Product: Scada-LTS

Description

A flaw has been found in Scada-LTS up to 2.7.8.1. This issue affects some unknown processing of the file /reports.shtm of the component Reports Module. This manipulation of the argument Colour causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/11/2025, 01:00:37 UTC

Technical Analysis

CVE-2025-10235 is a cross-site scripting (XSS) vulnerability identified in Scada-LTS versions up to 2.7.8.1, specifically within the Reports Module component handling the /reports.shtm file. The vulnerability arises from improper sanitization or validation of the 'Colour' argument, which allows an attacker to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without authentication, although it requires user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 4.8, categorized as medium severity. The attack vector is network-based (remote), with low attack complexity, no privileges required, but user interaction is necessary. The impact primarily affects the integrity of the user session and potentially confidentiality if sensitive data is accessible via the injected script. The vendor was notified but did not respond, and no patches have been published yet. While no known exploits are reported in the wild, proof-of-concept code is available, increasing the risk of exploitation. Given that Scada-LTS is an open-source SCADA platform used for industrial control systems, this vulnerability could be leveraged to perform phishing, session hijacking, or deliver further payloads within critical infrastructure environments.

Potential Impact

For European organizations, especially those operating critical infrastructure such as energy, water, manufacturing, and transportation sectors that rely on SCADA systems, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized script execution in operator consoles or management interfaces, potentially allowing attackers to manipulate displayed data, steal session tokens, or conduct social engineering attacks targeting system operators. While the vulnerability does not directly allow control system manipulation, the compromise of operator interfaces can facilitate further attacks or disrupt monitoring and reporting functions. The medium severity score reflects limited direct impact on availability or control system integrity but highlights the risk to confidentiality and integrity of user sessions. European organizations with deployments of Scada-LTS, particularly in countries with significant industrial automation adoption, may face increased exposure. The lack of vendor response and absence of patches exacerbate the risk, as organizations must rely on mitigations or workarounds until a fix is available.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations to reduce exposure. These include: 1) Restricting access to the /reports.shtm endpoint via network segmentation and firewall rules to limit exposure to trusted users and IP ranges only. 2) Employing web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'Colour' parameter. 3) Encouraging operators to avoid clicking on suspicious links or interacting with untrusted content related to the reports module. 4) Implementing Content Security Policy (CSP) headers on the SCADA web interface to restrict script execution sources and mitigate XSS impact. 5) Monitoring logs for unusual requests or patterns targeting the vulnerable parameter. 6) Considering temporary disabling or restricting the Reports Module if feasible until a patch is released. 7) Engaging with the vendor or community to track patch availability and applying updates promptly once released. These targeted mitigations go beyond generic advice by focusing on controlling access, filtering inputs at the network and application layers, and reducing the attack surface in operational environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-10T13:53:37.713Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c21bb612193b50d3025395

Added to database: 9/11/2025, 12:45:42 AM

Last enriched: 9/11/2025, 1:00:37 AM

Last updated: 9/11/2025, 2:43:21 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats