Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9292: CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains in TP-Link Systems Inc. Omada Cloud Controller

0
Low
VulnerabilityCVE-2025-9292cvecve-2025-9292cwe-942
Published: Fri Feb 13 2026 (02/13/2026, 00:21:24 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Omada Cloud Controller

Description

A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 08:30:59 UTC

Technical Analysis

CVE-2025-9292 is a vulnerability classified under CWE-942, indicating a permissive cross-domain security policy involving untrusted domains in TP-Link Systems Inc.'s Omada Cloud Controller. The issue arises from a web security configuration that allows cross-origin restrictions, typically enforced by modern browsers, to be bypassed under certain conditions. Specifically, the vulnerability can be exploited only if there is an existing client-side injection flaw (such as XSS) and an attacker has authenticated user access to the affected web interface. This chained exploitation scenario enables unauthorized disclosure of sensitive information by circumventing same-origin policy protections. The vulnerability does not directly allow remote code execution or privilege escalation but can expose confidential data if exploited. TP-Link has addressed this vulnerability by automatically deploying updated versions of the Omada Cloud Controller service, eliminating the need for manual user intervention. The CVSS 4.0 base score is 2.0, reflecting low severity due to the requirement of prior authentication, user interaction, and the presence of another vulnerability to enable exploitation. No known active exploits have been reported in the wild, reducing immediate risk. However, the vulnerability highlights the importance of strict cross-origin policies and secure client-side coding practices to prevent chained attacks.

Potential Impact

The primary impact of CVE-2025-9292 is the potential unauthorized disclosure of sensitive information from the Omada Cloud Controller web interface. While the vulnerability itself does not allow direct remote exploitation or privilege escalation, it can be leveraged in combination with client-side injection vulnerabilities to bypass browser security policies. This could lead to leakage of configuration data, credentials, or other sensitive operational information managed by the Omada Cloud Controller. For organizations, this could compromise network management confidentiality and potentially aid attackers in further targeting network infrastructure. The impact is limited by the requirement for authenticated user access and the presence of another client-side injection vulnerability, reducing the likelihood of widespread exploitation. Nevertheless, in environments where Omada Cloud Controller is critical for network management, any data disclosure could have operational and security repercussions. Since TP-Link has automatically deployed patches, the window of exposure is expected to be short, but unpatched or offline instances remain at risk.

Mitigation Recommendations

To mitigate CVE-2025-9292 effectively, organizations should: 1) Verify that their Omada Cloud Controller instances are running the latest patched versions automatically deployed by TP-Link; 2) Conduct thorough security assessments to identify and remediate any existing client-side injection vulnerabilities (e.g., XSS) within the Omada Cloud Controller interface or integrated components, as these are prerequisites for exploitation; 3) Enforce strict access controls and limit authenticated user access to trusted personnel only, reducing the risk of insider threats or compromised credentials; 4) Implement Content Security Policy (CSP) headers and other browser security mechanisms to further restrict cross-origin interactions; 5) Monitor network management interfaces for unusual activity that could indicate attempts to exploit chained vulnerabilities; 6) Maintain regular software update policies and verify automatic patch deployments to ensure no instances remain vulnerable; 7) Educate administrators on the risks of cross-domain policies and the importance of secure coding practices in web interfaces. These steps go beyond generic patching by addressing the chained nature of the exploit and reinforcing defense-in-depth.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-08-20T22:24:24.501Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698e788cc9e1ff5ad8549276

Added to database: 2/13/2026, 1:04:12 AM

Last enriched: 2/20/2026, 8:30:59 AM

Last updated: 3/30/2026, 12:17:48 AM

Views: 200

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses