CVE-2025-13791: Path Traversal in Scada-LTS
A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13791 is a path traversal vulnerability identified in Scada-LTS, an open-source SCADA platform widely used for industrial control and monitoring. The vulnerability exists in the Common.getHomeDir method of the ZIPProjectManager.java file, part of the Project Import functionality. This flaw allows an attacker to manipulate file paths by injecting traversal sequences (e.g., ../) to access files and directories outside the intended home directory. The vulnerability can be exploited remotely without user interaction and requires only low-level privileges, making it accessible to a broader range of attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, with no authentication or user interaction required. Exploitation could lead to unauthorized reading or modification of sensitive files, potentially disrupting SCADA operations or leaking critical configuration data. The vendor has not responded to early disclosure attempts, and no official patches or mitigations have been published, increasing the urgency for organizations to implement defensive measures. The exploit code is publicly available, increasing the risk of exploitation in the wild despite no current reports of active attacks.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as energy, water, and manufacturing sectors that rely on SCADA systems like Scada-LTS, this vulnerability poses a significant risk. Unauthorized file access could lead to leakage of sensitive operational data or manipulation of configuration files, potentially causing system misconfigurations or downtime. While the vulnerability does not allow full system compromise directly, it can serve as a foothold for further attacks, including lateral movement within industrial networks. The medium severity rating indicates that while immediate catastrophic failures are unlikely, the disruption of industrial processes or exposure of proprietary information could have serious operational and financial consequences. Given Europe's strong regulatory environment around critical infrastructure protection, exploitation could also lead to compliance violations and reputational damage.
Mitigation Recommendations
Since no official patch is available, European organizations should implement the following specific mitigations: 1) Restrict network access to the Scada-LTS Project Import service using firewalls and network segmentation to limit exposure to trusted administrators only. 2) Employ strict input validation and sanitization at the application or proxy level to detect and block path traversal payloads. 3) Monitor file system access logs for unusual or unauthorized file reads/writes outside expected directories, using SIEM or specialized ICS monitoring tools. 4) Implement application-layer access controls to restrict file operations to authorized users and processes. 5) Regularly back up SCADA configurations and data to enable recovery in case of tampering. 6) Engage with the vendor or community to track patch releases and apply updates promptly once available. 7) Conduct security awareness training for ICS operators to recognize and report suspicious activity. 8) Consider deploying host-based intrusion detection systems (HIDS) on SCADA servers to detect anomalous file system activity related to path traversal attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Spain, Poland, Belgium, Sweden
CVE-2025-13791: Path Traversal in Scada-LTS
Description
A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13791 is a path traversal vulnerability identified in Scada-LTS, an open-source SCADA platform widely used for industrial control and monitoring. The vulnerability exists in the Common.getHomeDir method of the ZIPProjectManager.java file, part of the Project Import functionality. This flaw allows an attacker to manipulate file paths by injecting traversal sequences (e.g., ../) to access files and directories outside the intended home directory. The vulnerability can be exploited remotely without user interaction and requires only low-level privileges, making it accessible to a broader range of attackers. The CVSS 4.0 base score is 5.3 (medium), reflecting the moderate impact on confidentiality, integrity, and availability, with no authentication or user interaction required. Exploitation could lead to unauthorized reading or modification of sensitive files, potentially disrupting SCADA operations or leaking critical configuration data. The vendor has not responded to early disclosure attempts, and no official patches or mitigations have been published, increasing the urgency for organizations to implement defensive measures. The exploit code is publicly available, increasing the risk of exploitation in the wild despite no current reports of active attacks.
Potential Impact
For European organizations, particularly those operating critical infrastructure such as energy, water, and manufacturing sectors that rely on SCADA systems like Scada-LTS, this vulnerability poses a significant risk. Unauthorized file access could lead to leakage of sensitive operational data or manipulation of configuration files, potentially causing system misconfigurations or downtime. While the vulnerability does not allow full system compromise directly, it can serve as a foothold for further attacks, including lateral movement within industrial networks. The medium severity rating indicates that while immediate catastrophic failures are unlikely, the disruption of industrial processes or exposure of proprietary information could have serious operational and financial consequences. Given Europe's strong regulatory environment around critical infrastructure protection, exploitation could also lead to compliance violations and reputational damage.
Mitigation Recommendations
Since no official patch is available, European organizations should implement the following specific mitigations: 1) Restrict network access to the Scada-LTS Project Import service using firewalls and network segmentation to limit exposure to trusted administrators only. 2) Employ strict input validation and sanitization at the application or proxy level to detect and block path traversal payloads. 3) Monitor file system access logs for unusual or unauthorized file reads/writes outside expected directories, using SIEM or specialized ICS monitoring tools. 4) Implement application-layer access controls to restrict file operations to authorized users and processes. 5) Regularly back up SCADA configurations and data to enable recovery in case of tampering. 6) Engage with the vendor or community to track patch releases and apply updates promptly once available. 7) Conduct security awareness training for ICS operators to recognize and report suspicious activity. 8) Consider deploying host-based intrusion detection systems (HIDS) on SCADA servers to detect anomalous file system activity related to path traversal attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-29T20:33:41.040Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692c6a32979ac8a99b70b707
Added to database: 11/30/2025, 4:00:50 PM
Last enriched: 12/7/2025, 5:07:52 PM
Last updated: 1/19/2026, 8:43:35 AM
Views: 127
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1145: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-1144: Use After Free in quickjs-ng quickjs
MediumCVE-2026-1143: Buffer Overflow in TOTOLINK A3700R
HighCVE-2026-1142: Cross-Site Request Forgery in PHPGurukul News Portal
MediumCVE-2026-1141: Improper Authorization in PHPGurukul News Portal
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.