CVE-2025-9138

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-9138
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-9138.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-9138
Published
2025-08-19T13:15:42.177Z
Modified
2025-11-17T01:38:43.204500Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A vulnerability was found in Scada-LTS 2.7.8.1. Affected is an unknown function of the file pointHierarchy/new/. Performing manipulation of the argument Title results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor explains: "[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower. An admin user - by definition - has full control over HTML and JS code that is delivered to users in regular synoptic panels. In other words - due to the design of the system it is not possible to limit the admin user to attack the users."

References

Affected packages

Git / github.com/scada-lts/scada-lts

Affected ranges

Type
GIT
Repo
https://github.com/scada-lts/scada-lts
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.0.9.7
0.0.9.8

v.*

v.2.5.3

v0.*

v0.0.1-test-release
v0.0.2-alpha.2
v0.0.3-alpha
v0.0.4-alpha
v0.0.4.1
v0.0.5-betta
v0.0.6-test-modbus.3.0.2
v0.0.7
v0.0.7-next-test
v0.0.7-test
v0.0.7.1-test
v0.0.7.2-test
v0.0.7.3
v0.0.7.4
v0.0.8
v0.0.9
v0.0.9.1
v0.0.9.2
v0.0.9.3
v0.0.9.4
v0.0.9.5
v0.0.9.5_1
v0.0.9.6
v0.0.9.6_1
v0.0.9.6_2
v0.0.9.8

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.0_19_02_2020
v2.2.0
v2.2.1
v2.3.0
v2.3.1
v2.3.2
v2.4.0
v2.4.1
v2.4.1.1
v2.5.0
v2.5.1
v2.5.2
v2.6.0
v2.6.1
v2.6.10
v2.6.10-rc1
v2.6.11
v2.6.12
v2.6.13
v2.6.14
v2.6.15
v2.6.16
v2.6.17
v2.6.2
v2.6.3
v2.6.4
v2.6.5
v2.6.8
v2.6.9
v2.7.1
v2.7.1.1
v2.7.2
v2.7.2.1
v2.7.3
v2.7.4
v2.7.4.1
v2.7.5
v2.7.5.1
v2.7.5.2
v2.7.5.3
v2.7.5.4
v2.7.6
v2.7.6.1
v2.7.7
v2.7.7.1
v2.7.7.2
v2.7.7.3
v2.7.8
v2.7.8.1