{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-7728","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-07-16T20:29:42.646Z","datePublished":"2025-07-17T01:14:05.511Z","dateUpdated":"2025-07-17T14:44:25.711Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-07-17T02:10:24.093Z"},"title":"Scada-LTS users.shtm cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"n/a","product":"Scada-LTS","versions":[{"version":"2.7.8.0","status":"affected"},{"version":"2.7.8.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability classified as problematic has been found in Scada-LTS up to 2.7.8.1. Affected is an unknown function of the file users.shtm. The manipulation of the argument Username leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this issue and confirmed that it will be fixed in the upcoming release 2.8.0."},{"lang":"de","value":"Es wurde eine problematische Schwachstelle in Scada-LTS bis 2.7.8.1 entdeckt. Es betrifft eine unbekannte Funktion der Datei users.shtm. Durch das Beeinflussen des Arguments Username mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:C","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:C"}}],"timeline":[{"time":"2025-07-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-07-16T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-07-17T04:12:17.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"nmmorette (VulDB User)","type":"reporter"},{"lang":"en","value":"nmmorette (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.316710","name":"VDB-316710 | Scada-LTS users.shtm cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.316710","name":"VDB-316710 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.607949","name":"Submit #607949 | SCADA-LTS 2.7.8.1 Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/CVE-2025-7728.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-07-17T14:41:23.735286Z","id":"CVE-2025-7728","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-07-17T14:44:25.711Z"}}]}}