A vulnerability was determined in Scada-LTS up to 2.7.8.1. This impacts an unknown function of the file watch_list.shtm. Executing manipulation of the argument Name can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
References
| Link | Resource |
|---|---|
| https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md | Exploit Third Party Advisory |
| https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored_XSS_endpoint_watch_list.shtm_parameter_name.md#poc | Broken Link |
| https://vuldb.com/?ctiid.321221 | Permissions Required VDB Entry |
| https://vuldb.com/?id.321221 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.630800 | Third Party Advisory VDB Entry |
| https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md | Exploit Third Party Advisory |
| https://vuldb.com/?submit.630800 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-08-24 13:15
Updated : 2025-09-11 15:37
NVD link : CVE-2025-9388
Mitre link : CVE-2025-9388
CVE.ORG link : CVE-2025-9388
JSON object : View
Products Affected
scada-lts
- scada-lts
