Submit #623428: Scada-LTS 2.7.8.1 Cross Site Scripting (XSS) Storedinfo

TitleScada-LTS 2.7.8.1 Cross Site Scripting (XSS) Stored
DescriptionCross-Site Scripting (XSS) Stored endpoint `data_source_edit.shtm` parameter `name` --- ## Summary A Stored Cross-Site Scripting (XSS) vulnerability was identified in the `data_source_edit.shtm` endpoint of the _SCADA-LTS_ application. This vulnerability allows attackers to inject malicious scripts into the `name` parameter. The injected payload is stored on the server and executed automatically in the browser of any user who accesses the affected data source entry, creating a persistent attack vector. --- ## Details **Vulnerable Endpoint:** `POST /data_source_edit.shtm` **Parameter:** `name` The application does not properly validate or sanitize input in the `name` field. As a result, an attacker can inject JavaScript code, which is stored in the system and later rendered in the application’s interface, leading to automatic execution in the user's browser. --- ## PoC **Payload:** `"><img src=x onerror=alert('XSS-PoC3')>` ### Steps to Reproduce: 1. Log in to the _SCADA-LTS_ application with an account that has permission to create or edit data sources. 2. Navigate to the **Data Sources** section and select **Add Data Source** or edit an existing entry. 3. In the **Name** field, insert the payload above: `"><img src=x onerror=alert('XSS-PoC3')>` 4. Fill in any other required fields and click **Save**. ![[Pasted image 20250722175722.png]] 5. The stored payload is executed immediately in the browser, confirming the Stored XSS vulnerability. ![[Pasted image 20250722175822.png]] --- ## Impact Stored XSS attacks can lead to severe consequences, including: - **Session hijacking:** Stealing cookies or authentication tokens to impersonate users - **Credential theft:** Capturing usernames and passwords through malicious scripts - **Malware delivery:** Distributing harmful code to application users - **Privilege escalation:** Compromising higher-privilege accounts via persistent scripts - **Data manipulation or defacement:** Altering displayed content in the application - **Reputation damage:** Eroding trust among system users and stakeholders
Source⚠️ https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Cross-Site_Scripting_(XSS)_Stored_endpoint_data_source_edit.shtm_parameter_name.md
User
 marceloQz (UID 87549)
Submission07/26/2025 15:44 (9 months ago)
Moderation08/08/2025 10:53 (13 days later)
StatusAccepted
VulDB entry319239 [Scada-LTS up to 2.7.8.1 Virtual Data Source Property /data_source_edit.shtm Name cross site scripting]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!