CVE-2025-9137

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-9137
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-9137.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-9137
Published
2025-08-19T13:15:41.870Z
Modified
2025-11-17T02:01:18.247316Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability has been found in Scada-LTS 2.7.8.1. This impacts an unknown function of the file scheduled_events.shtm. Such manipulation of the argument alias leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor explains: "[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower. An admin user - by definition - has full control over HTML and JS code that is delivered to users in regular synoptic panels. In other words - due to the design of the system it is not possible to limit the admin user to attack the users."

References

Affected packages

Git / github.com/scada-lts/scada-lts

Affected ranges

Type
GIT
Repo
https://github.com/scada-lts/scada-lts
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.0.9.7
0.0.9.8

v.*

v.2.5.3

v0.*

v0.0.1-test-release
v0.0.2-alpha.2
v0.0.3-alpha
v0.0.4-alpha
v0.0.4.1
v0.0.5-betta
v0.0.6-test-modbus.3.0.2
v0.0.7
v0.0.7-next-test
v0.0.7-test
v0.0.7.1-test
v0.0.7.2-test
v0.0.7.3
v0.0.7.4
v0.0.8
v0.0.9
v0.0.9.1
v0.0.9.2
v0.0.9.3
v0.0.9.4
v0.0.9.5
v0.0.9.5_1
v0.0.9.6
v0.0.9.6_1
v0.0.9.6_2
v0.0.9.8

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.0_19_02_2020
v2.2.0
v2.2.1
v2.3.0
v2.3.1
v2.3.2
v2.4.0
v2.4.1
v2.4.1.1
v2.5.0
v2.5.1
v2.5.2
v2.6.0
v2.6.1
v2.6.10
v2.6.10-rc1
v2.6.11
v2.6.12
v2.6.13
v2.6.14
v2.6.15
v2.6.16
v2.6.17
v2.6.2
v2.6.3
v2.6.4
v2.6.5
v2.6.8
v2.6.9
v2.7.1
v2.7.1.1
v2.7.2
v2.7.2.1
v2.7.3
v2.7.4
v2.7.4.1
v2.7.5
v2.7.5.1
v2.7.5.2
v2.7.5.3
v2.7.5.4
v2.7.6
v2.7.6.1
v2.7.7
v2.7.7.1
v2.7.7.2
v2.7.7.3
v2.7.8
v2.7.8.1