A vulnerability was determined in Scada-LTS up to 2.7.8.1. This impacts an unknown function of the file watch_list.shtm. Executing manipulation of the argument Name can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been publicly disclosed and may be utilized.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://vuldb.com/?id.321221 | technical description vdb entry |
https://vuldb.com/?ctiid.321221 | permissions required signature |
https://vuldb.com/?submit.630800 | third party advisory |
https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-9388.md | related |
https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Stored_XSS_endpoint_watch_list.shtm_parameter_name.md#poc | broken link exploit |