Skip to main content

CVE-2025-9235: Cross Site Scripting in Scada-LTS

Medium
VulnerabilityCVE-2025-9235cvecve-2025-9235
Published: Wed Aug 20 2025 (08/20/2025, 17:02:08 UTC)
Source: CVE Database V5
Product: Scada-LTS

Description

A flaw has been found in Scada-LTS up to 2.7.8.1. The impacted element is an unknown function of the file compound_events.shtm. This manipulation of the argument Name causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used.

AI-Powered Analysis

AILast updated: 08/20/2025, 17:32:47 UTC

Technical Analysis

CVE-2025-9235 is a cross-site scripting (XSS) vulnerability identified in Scada-LTS versions up to 2.7.8.1. The vulnerability resides in an unspecified function within the file compound_events.shtm, where improper handling of the 'Name' argument allows an attacker to inject malicious scripts. This flaw can be exploited remotely without requiring authentication, although user interaction is necessary for the attack to succeed (e.g., a victim must visit a crafted URL or interact with malicious content). The vulnerability is classified as medium severity with a CVSS 4.0 base score of 5.1, reflecting its moderate impact and ease of exploitation. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The impact primarily affects integrity and confidentiality to a limited extent, with no direct impact on availability. The vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim's browser session, potentially leading to session hijacking, unauthorized actions, or information disclosure within the Scada-LTS web interface. Although no known exploits are currently observed in the wild, the public availability of exploit code increases the risk of exploitation. Scada-LTS is an open-source SCADA system used for industrial control and monitoring, making this vulnerability particularly relevant to critical infrastructure environments.

Potential Impact

For European organizations, especially those operating critical infrastructure or industrial control systems using Scada-LTS, this vulnerability poses a tangible risk. Successful exploitation could enable attackers to perform unauthorized actions within the SCADA web interface, potentially disrupting monitoring or control processes. While the vulnerability does not directly impact system availability, the compromise of session integrity or confidentiality could lead to further attacks or manipulation of operational data. Given the increasing targeting of industrial control systems in Europe by cyber adversaries, this XSS flaw could be leveraged as an initial foothold or lateral movement vector. Organizations in sectors such as energy, manufacturing, water management, and transportation that rely on Scada-LTS for supervisory control should be particularly vigilant. The medium severity rating suggests a moderate risk; however, the critical nature of SCADA environments amplifies the potential operational impact beyond the CVSS score alone.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately assess their use of Scada-LTS versions 2.7.8.0 and 2.7.8.1 and plan for an upgrade once a vendor patch or fix is released. In the absence of an official patch, organizations should implement the following specific measures: 1) Apply strict input validation and output encoding on the 'Name' parameter within the compound_events.shtm file to neutralize malicious scripts. 2) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable parameter. 3) Restrict access to the Scada-LTS web interface to trusted networks and enforce multi-factor authentication to reduce the risk of unauthorized access. 4) Conduct regular security awareness training for users to recognize and avoid phishing attempts that could trigger XSS exploitation. 5) Monitor web server logs and network traffic for anomalous requests indicative of exploitation attempts. 6) Segment SCADA networks from corporate IT networks to limit the blast radius of any compromise. These targeted actions go beyond generic advice and address the specific attack vector and environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-20T10:52:00.657Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a6033dad5a09ad00074ca0

Added to database: 8/20/2025, 5:17:49 PM

Last enriched: 8/20/2025, 5:32:47 PM

Last updated: 8/20/2025, 5:32:49 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats