CVE-2025-13790: Cross-Site Request Forgery in Scada-LTS
A vulnerability was determined in Scada-LTS up to 2.7.8.1. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13790 is a Cross-Site Request Forgery vulnerability identified in Scada-LTS, an open-source supervisory control and data acquisition (SCADA) platform used for industrial automation and monitoring. The vulnerability affects versions 2.7.8.0 and 2.7.8.1. CSRF occurs when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim's browser to perform unwanted actions on a web application where they are logged in. This vulnerability does not require the attacker to have any privileges or authentication, but it does require the victim to interact with a maliciously crafted link or webpage. The CVSS 4.0 base score is 5.3 (medium), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and causing limited integrity impact. The vendor was contacted but has not responded or issued a patch, and no official remediation is currently available. The vulnerability could allow attackers to manipulate critical SCADA functions remotely, potentially disrupting industrial processes or causing unauthorized configuration changes. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. No known exploits have been observed in the wild yet, but public disclosure raises the risk of exploitation attempts.
Potential Impact
The primary impact of this vulnerability is on the integrity of SCADA systems using Scada-LTS, as attackers could execute unauthorized commands by exploiting CSRF. This could lead to unauthorized changes in control settings, manipulation of monitoring data, or disruption of industrial processes. Given the critical role of SCADA systems in infrastructure such as energy, water treatment, manufacturing, and transportation, successful exploitation could have cascading effects on operational continuity and safety. Although availability and confidentiality impacts are limited, the integrity compromise alone can lead to significant operational risks and potential safety hazards. The requirement for user interaction somewhat limits exploitation ease, but social engineering tactics could facilitate attacks. The absence of vendor patches means organizations must rely on alternative mitigations to reduce risk. The medium severity rating reflects these factors, but the critical nature of SCADA environments elevates the practical risk for affected organizations.
Mitigation Recommendations
Since no official patches are available, organizations should implement multiple compensating controls. First, enforce strict CSRF protections at the web application layer, such as validating anti-CSRF tokens on all state-changing requests and verifying the Origin and Referer headers. Network segmentation should isolate SCADA management interfaces from general user networks to reduce exposure. User training is essential to raise awareness about phishing and social engineering risks that could trigger CSRF attacks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting Scada-LTS interfaces. Monitor logs for unusual or unauthorized commands and implement anomaly detection to identify potential exploitation. Where feasible, restrict access to the Scada-LTS web interface to trusted IP addresses and require multi-factor authentication to reduce the risk of session hijacking. Regularly back up configurations and critical data to enable recovery from unauthorized changes. Finally, maintain vigilance for vendor updates or community patches and apply them promptly once available.
Affected Countries
United States, Germany, China, Russia, South Korea, Japan, France, United Kingdom, Canada, Australia
CVE-2025-13790: Cross-Site Request Forgery in Scada-LTS
Description
A vulnerability was determined in Scada-LTS up to 2.7.8.1. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13790 is a Cross-Site Request Forgery vulnerability identified in Scada-LTS, an open-source supervisory control and data acquisition (SCADA) platform used for industrial automation and monitoring. The vulnerability affects versions 2.7.8.0 and 2.7.8.1. CSRF occurs when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim's browser to perform unwanted actions on a web application where they are logged in. This vulnerability does not require the attacker to have any privileges or authentication, but it does require the victim to interact with a maliciously crafted link or webpage. The CVSS 4.0 base score is 5.3 (medium), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and causing limited integrity impact. The vendor was contacted but has not responded or issued a patch, and no official remediation is currently available. The vulnerability could allow attackers to manipulate critical SCADA functions remotely, potentially disrupting industrial processes or causing unauthorized configuration changes. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. No known exploits have been observed in the wild yet, but public disclosure raises the risk of exploitation attempts.
Potential Impact
The primary impact of this vulnerability is on the integrity of SCADA systems using Scada-LTS, as attackers could execute unauthorized commands by exploiting CSRF. This could lead to unauthorized changes in control settings, manipulation of monitoring data, or disruption of industrial processes. Given the critical role of SCADA systems in infrastructure such as energy, water treatment, manufacturing, and transportation, successful exploitation could have cascading effects on operational continuity and safety. Although availability and confidentiality impacts are limited, the integrity compromise alone can lead to significant operational risks and potential safety hazards. The requirement for user interaction somewhat limits exploitation ease, but social engineering tactics could facilitate attacks. The absence of vendor patches means organizations must rely on alternative mitigations to reduce risk. The medium severity rating reflects these factors, but the critical nature of SCADA environments elevates the practical risk for affected organizations.
Mitigation Recommendations
Since no official patches are available, organizations should implement multiple compensating controls. First, enforce strict CSRF protections at the web application layer, such as validating anti-CSRF tokens on all state-changing requests and verifying the Origin and Referer headers. Network segmentation should isolate SCADA management interfaces from general user networks to reduce exposure. User training is essential to raise awareness about phishing and social engineering risks that could trigger CSRF attacks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting Scada-LTS interfaces. Monitor logs for unusual or unauthorized commands and implement anomaly detection to identify potential exploitation. Where feasible, restrict access to the Scada-LTS web interface to trusted IP addresses and require multi-factor authentication to reduce the risk of session hijacking. Regularly back up configurations and critical data to enable recovery from unauthorized changes. Finally, maintain vigilance for vendor updates or community patches and apply them promptly once available.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-29T20:33:29.818Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692c5d1e0c99497f3fe5ed70
Added to database: 11/30/2025, 3:05:02 PM
Last enriched: 2/24/2026, 10:11:14 PM
Last updated: 3/24/2026, 5:02:13 PM
Views: 227
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.