Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13790: Cross-Site Request Forgery in Scada-LTS

0
Medium
VulnerabilityCVE-2025-13790cvecve-2025-13790
Published: Sun Nov 30 2025 (11/30/2025, 14:32:06 UTC)
Source: CVE Database V5
Product: Scada-LTS

Description

A vulnerability was determined in Scada-LTS up to 2.7.8.1. This impacts an unknown function. This manipulation causes cross-site request forgery. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:11:14 UTC

Technical Analysis

CVE-2025-13790 is a Cross-Site Request Forgery vulnerability identified in Scada-LTS, an open-source supervisory control and data acquisition (SCADA) platform used for industrial automation and monitoring. The vulnerability affects versions 2.7.8.0 and 2.7.8.1. CSRF occurs when an attacker tricks an authenticated user into submitting a forged HTTP request, causing the victim's browser to perform unwanted actions on a web application where they are logged in. This vulnerability does not require the attacker to have any privileges or authentication, but it does require the victim to interact with a maliciously crafted link or webpage. The CVSS 4.0 base score is 5.3 (medium), reflecting the network attack vector, low complexity, no privileges required, but requiring user interaction and causing limited integrity impact. The vendor was contacted but has not responded or issued a patch, and no official remediation is currently available. The vulnerability could allow attackers to manipulate critical SCADA functions remotely, potentially disrupting industrial processes or causing unauthorized configuration changes. The lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. No known exploits have been observed in the wild yet, but public disclosure raises the risk of exploitation attempts.

Potential Impact

The primary impact of this vulnerability is on the integrity of SCADA systems using Scada-LTS, as attackers could execute unauthorized commands by exploiting CSRF. This could lead to unauthorized changes in control settings, manipulation of monitoring data, or disruption of industrial processes. Given the critical role of SCADA systems in infrastructure such as energy, water treatment, manufacturing, and transportation, successful exploitation could have cascading effects on operational continuity and safety. Although availability and confidentiality impacts are limited, the integrity compromise alone can lead to significant operational risks and potential safety hazards. The requirement for user interaction somewhat limits exploitation ease, but social engineering tactics could facilitate attacks. The absence of vendor patches means organizations must rely on alternative mitigations to reduce risk. The medium severity rating reflects these factors, but the critical nature of SCADA environments elevates the practical risk for affected organizations.

Mitigation Recommendations

Since no official patches are available, organizations should implement multiple compensating controls. First, enforce strict CSRF protections at the web application layer, such as validating anti-CSRF tokens on all state-changing requests and verifying the Origin and Referer headers. Network segmentation should isolate SCADA management interfaces from general user networks to reduce exposure. User training is essential to raise awareness about phishing and social engineering risks that could trigger CSRF attacks. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attempts targeting Scada-LTS interfaces. Monitor logs for unusual or unauthorized commands and implement anomaly detection to identify potential exploitation. Where feasible, restrict access to the Scada-LTS web interface to trusted IP addresses and require multi-factor authentication to reduce the risk of session hijacking. Regularly back up configurations and critical data to enable recovery from unauthorized changes. Finally, maintain vigilance for vendor updates or community patches and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-29T20:33:29.818Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692c5d1e0c99497f3fe5ed70

Added to database: 11/30/2025, 3:05:02 PM

Last enriched: 2/24/2026, 10:11:14 PM

Last updated: 3/24/2026, 5:02:13 PM

Views: 227

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses