Skip to main content

CVE-2025-9144: Cross Site Scripting in Scada-LTS

Medium
VulnerabilityCVE-2025-9144cvecve-2025-9144
Published: Tue Aug 19 2025 (08/19/2025, 15:02:08 UTC)
Source: CVE Database V5
Product: Scada-LTS

Description

A weakness has been identified in Scada-LTS 2.7.8.1. This vulnerability affects unknown code of the file publisher_edit.shtm. This manipulation of the argument Name causes cross site scripting. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 08/27/2025, 00:56:23 UTC

Technical Analysis

CVE-2025-9144 is a cross-site scripting (XSS) vulnerability identified in Scada-LTS version 2.7.8.1, specifically within the file publisher_edit.shtm. The vulnerability arises from improper sanitization or validation of the 'Name' argument, allowing an attacker to inject malicious scripts. This flaw can be exploited remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload, as indicated by the CVSS vector. The vulnerability has a CVSS 4.0 base score of 5.1, categorizing it as medium severity. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The impact primarily affects the integrity and confidentiality of the affected system to a limited extent, with no direct impact on availability. Exploitation could lead to session hijacking, credential theft, or execution of arbitrary scripts in the context of the victim's browser, potentially enabling further attacks such as privilege escalation or lateral movement within the SCADA environment. Although no public exploits are currently known in the wild, the availability of exploit code increases the risk of exploitation. Given that Scada-LTS is a platform used for Supervisory Control and Data Acquisition (SCADA) systems, which are critical for industrial control and infrastructure management, this vulnerability poses a risk to operational technology environments if left unmitigated.

Potential Impact

For European organizations, especially those operating critical infrastructure such as energy, water, transportation, and manufacturing sectors, this vulnerability could have significant consequences. SCADA systems are integral to the monitoring and control of industrial processes; a successful XSS attack could enable attackers to manipulate control interfaces, steal sensitive operational data, or disrupt normal operations indirectly through social engineering or session hijacking. Although the vulnerability itself does not directly compromise system availability, the potential for attackers to gain footholds or escalate privileges could lead to more severe attacks impacting system integrity and availability. The medium severity score reflects a moderate risk, but the critical nature of SCADA environments amplifies the potential impact. European organizations must consider the regulatory implications under frameworks like NIS2 Directive and GDPR, as exploitation could lead to data breaches and operational disruptions with legal and financial repercussions.

Mitigation Recommendations

To mitigate CVE-2025-9144, European organizations should: 1) Immediately update Scada-LTS to a patched version once available, as no patch links are currently provided, monitoring vendor advisories closely. 2) Implement strict input validation and output encoding on all user-supplied data, particularly the 'Name' parameter in publisher_edit.shtm, to prevent script injection. 3) Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting SCADA web interfaces. 4) Restrict access to SCADA web portals via network segmentation and VPNs, limiting exposure to the internet and reducing attack surface. 5) Conduct regular security assessments and penetration testing focused on web interfaces of SCADA systems. 6) Educate users and administrators about the risks of XSS and the importance of cautious interaction with web-based control panels. 7) Monitor logs and network traffic for suspicious activities indicative of exploitation attempts. These steps go beyond generic advice by focusing on the unique context of SCADA environments and the specific vulnerable component.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T07:22:45.891Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a4959aad5a09ad00f8b3c1

Added to database: 8/19/2025, 3:17:46 PM

Last enriched: 8/27/2025, 12:56:23 AM

Last updated: 10/3/2025, 4:08:34 AM

Views: 41

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats