A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/Xzzz111/exps/blob/main/archives/Scada-LTS-ZipSlip-1/report.md | Exploit Third Party Advisory |
| https://github.com/Xzzz111/exps/blob/main/archives/Scada-LTS-ZipSlip-1/report.md#proof-of-concept | Exploit |
| https://vuldb.com/?ctiid.333795 | Permissions Required VDB Entry |
| https://vuldb.com/?id.333795 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.690873 | Third Party Advisory VDB Entry |
Configurations
History
04 Dec 2025, 20:26
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Xzzz111/exps/blob/main/archives/Scada-LTS-ZipSlip-1/report.md - Exploit, Third Party Advisory | |
| References | () https://github.com/Xzzz111/exps/blob/main/archives/Scada-LTS-ZipSlip-1/report.md#proof-of-concept - Exploit | |
| References | () https://vuldb.com/?ctiid.333795 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.333795 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.690873 - Third Party Advisory, VDB Entry | |
| First Time |
Scada-lts scada-lts
Scada-lts |
|
| CPE | cpe:2.3:a:scada-lts:scada-lts:*:*:*:*:*:*:*:* |
30 Nov 2025, 16:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-30 16:15
Updated : 2025-12-04 20:26
NVD link : CVE-2025-13791
Mitre link : CVE-2025-13791
CVE.ORG link : CVE-2025-13791
JSON object : View
Products Affected
scada-lts
- scada-lts
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
