Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9143: Cross Site Scripting in Scada-LTS

0
Medium
VulnerabilityCVE-2025-9143cvecve-2025-9143
Published: Tue Aug 19 2025 (08/19/2025, 15:02:06 UTC)
Source: CVE Database V5
Product: Scada-LTS

Description

A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects an unknown part of the file mailing_lists.shtm. The manipulation of the argument name/userList/address results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

AI-Powered Analysis

AILast updated: 08/27/2025, 00:56:04 UTC

Technical Analysis

CVE-2025-9143 is a cross-site scripting (XSS) vulnerability identified in Scada-LTS version 2.7.8.1, specifically affecting an unspecified portion of the file mailing_lists.shtm. The vulnerability arises from improper sanitization of user-controllable input parameters, namely name, userList, and address. An attacker can manipulate these parameters to inject malicious scripts that execute in the context of the victim's browser. This flaw can be exploited remotely without authentication, although user interaction is required to trigger the malicious payload, such as by visiting a crafted URL or interacting with a compromised interface. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary. The impact primarily affects confidentiality and integrity at a low level, with no direct impact on availability or system control. While no public exploit is currently known to be actively used in the wild, the exploit code has been publicly released, increasing the risk of opportunistic attacks. Scada-LTS is an open-source SCADA (Supervisory Control and Data Acquisition) platform used for industrial control systems (ICS) monitoring and management, making this vulnerability relevant to critical infrastructure environments. The vulnerability could allow attackers to steal session cookies, perform actions on behalf of authenticated users, or conduct phishing attacks within the SCADA management interface, potentially leading to further compromise of industrial control operations.

Potential Impact

For European organizations, particularly those operating critical infrastructure such as energy, water treatment, manufacturing, and transportation sectors that rely on SCADA systems, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized access to control interfaces, data leakage, and manipulation of operational parameters through session hijacking or social engineering attacks. Although the vulnerability does not directly allow system takeover or denial of service, the ability to execute scripts in the context of legitimate users could facilitate lateral movement or escalation of privileges within the network. Given the increasing digitization and interconnectivity of industrial systems in Europe, this vulnerability could undermine operational integrity and safety, potentially causing economic and reputational damage. The medium severity rating suggests that while immediate catastrophic impacts are unlikely, the vulnerability should not be ignored, especially in environments where SCADA-LTS is deployed without additional compensating controls.

Mitigation Recommendations

1. Immediate patching: Organizations should monitor for official patches or updates from the Scada-LTS project addressing this vulnerability and apply them promptly once available. 2. Input validation and sanitization: Until a patch is released, implement web application firewalls (WAFs) or reverse proxies with custom rules to detect and block suspicious input patterns targeting the name, userList, and address parameters. 3. User awareness and training: Educate users with access to the SCADA interface about the risks of clicking unknown links or interacting with untrusted content to reduce the likelihood of successful XSS exploitation. 4. Segmentation and access control: Restrict access to the SCADA-LTS management interface to trusted networks and users only, employing VPNs and multi-factor authentication to reduce exposure. 5. Monitoring and logging: Enhance logging of web interface activities and monitor for anomalous behavior indicative of XSS exploitation attempts, such as unusual parameter values or repeated failed access attempts. 6. Content Security Policy (CSP): Where possible, implement CSP headers to limit the execution of unauthorized scripts within the SCADA web interface. 7. Incident response readiness: Prepare to respond to potential exploitation by having procedures in place to isolate affected systems and conduct forensic analysis.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T07:22:35.913Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a4959aad5a09ad00f8b3ba

Added to database: 8/19/2025, 3:17:46 PM

Last enriched: 8/27/2025, 12:56:04 AM

Last updated: 10/4/2025, 1:06:35 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats