CVE-2025-9143

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-9143
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-9143.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-9143
Published
2025-08-19T15:15:29.487Z
Modified
2025-11-17T01:56:09.841560Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects an unknown part of the file mailing_lists.shtm. The manipulation of the argument name/userList/address results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited.

References

Affected packages

Git / github.com/scada-lts/scada-lts

Affected ranges

Type
GIT
Repo
https://github.com/scada-lts/scada-lts
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

0.*

0.0.9.7
0.0.9.8

v.*

v.2.5.3

v0.*

v0.0.1-test-release
v0.0.2-alpha.2
v0.0.3-alpha
v0.0.4-alpha
v0.0.4.1
v0.0.5-betta
v0.0.6-test-modbus.3.0.2
v0.0.7
v0.0.7-next-test
v0.0.7-test
v0.0.7.1-test
v0.0.7.2-test
v0.0.7.3
v0.0.7.4
v0.0.8
v0.0.9
v0.0.9.1
v0.0.9.2
v0.0.9.3
v0.0.9.4
v0.0.9.5
v0.0.9.5_1
v0.0.9.6
v0.0.9.6_1
v0.0.9.6_2
v0.0.9.8

v2.*

v2.0.0
v2.0.1
v2.1.0
v2.1.0_19_02_2020
v2.2.0
v2.2.1
v2.3.0
v2.3.1
v2.3.2
v2.4.0
v2.4.1
v2.4.1.1
v2.5.0
v2.5.1
v2.5.2
v2.6.0
v2.6.1
v2.6.10
v2.6.10-rc1
v2.6.11
v2.6.12
v2.6.13
v2.6.14
v2.6.15
v2.6.16
v2.6.17
v2.6.2
v2.6.3
v2.6.4
v2.6.5
v2.6.8
v2.6.9
v2.7.1
v2.7.1.1
v2.7.2
v2.7.2.1
v2.7.3
v2.7.4
v2.7.4.1
v2.7.5
v2.7.5.1
v2.7.5.2
v2.7.5.3
v2.7.5.4
v2.7.6
v2.7.6.1
v2.7.7
v2.7.7.1
v2.7.7.2
v2.7.7.3
v2.7.8
v2.7.8.1