FKIE_CVE-2025-9289

Vulnerability from fkie_nvd - Published: 2026-01-22 22:16 - Updated: 2026-03-16 18:06
Summary
A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator’s browser, potentially exposing sensitive information and compromising confidentiality.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tp-link:omada_controller:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "3B623F6F-B033-44B4-9F50-97CE3C0F84E1",
              "versionEndExcluding": "6.0.0.24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tp-link:omada_controller:*:*:*:*:cloud:*:*:*",
              "matchCriteriaId": "DB01AAAF-90A1-4DA2-8810-D5A02D11ABCC",
              "versionEndExcluding": "6.0.0.100",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:tp-link:oc200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "036DEE09-EB29-4F38-A472-181FE88A1EAC",
              "versionEndExcluding": "1.37.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:tp-link:oc200:1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D994D0D1-FE36-4CB9-A641-CAAC8D643783",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:tp-link:oc220_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1836F980-6E1F-4305-973E-AB34BD046CFD",
              "versionEndExcluding": "1.2.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:tp-link:oc220:1:*:*:*:*:*:*:*",
              "matchCriteriaId": "077DD2BF-32E3-434E-B040-9B4C48F419CA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:tp-link:oc300_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1188840C-7B7B-4D07-A4D4-DED7D02E2971",
              "versionEndExcluding": "1.31.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:tp-link:oc300:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E90417C-17A3-4D55-9764-4EF93D19B610",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:tp-link:oc400_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B04AEC9-E614-4C99-98B5-568D845C3153",
              "versionEndExcluding": "1.9.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:tp-link:oc400:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "15655343-B8B7-4C17-8F9B-E90823407861",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:tp-link:oc200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F791A1D-CF64-44C9-B17C-FF8632E3B6BF",
              "versionEndExcluding": "2.22.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:tp-link:oc200:2:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D6AE05-E5BE-41A6-B3ED-16C5B15BF2A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tp-link:omada_controller:*:*:*:*:-:*:*:*",
              "matchCriteriaId": "64544C00-6B20-4320-850B-B83F99D72BC6",
              "versionEndExcluding": "6.0.0.34",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:tp-link:oc200:1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D994D0D1-FE36-4CB9-A641-CAAC8D643783",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:tp-link:oc200:2:*:*:*:*:*:*:*",
              "matchCriteriaId": "86D6AE05-E5BE-41A6-B3ED-16C5B15BF2A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:tp-link:oc220:1:*:*:*:*:*:*:*",
              "matchCriteriaId": "077DD2BF-32E3-434E-B040-9B4C48F419CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:tp-link:oc300:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E90417C-17A3-4D55-9764-4EF93D19B610",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:tp-link:oc400:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "15655343-B8B7-4C17-8F9B-E90823407861",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator\u2019s browser, potentially exposing sensitive information and compromising confidentiality."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de cross-site scripting (XSS) fue identificada en un par\u00e1metro en los Controladores Omada debido a una sanitizaci\u00f3n de entrada inadecuada. La explotaci\u00f3n requiere condiciones avanzadas, como el posicionamiento en la red o la emulaci\u00f3n de una entidad de confianza, y la interacci\u00f3n del usuario por parte de un administrador autenticado. Si tiene \u00e9xito, un atacante podr\u00eda ejecutar JavaScript arbitrario en el navegador del administrador, exponiendo potencialmente informaci\u00f3n sensible y comprometiendo la confidencialidad."
    }
  ],
  "id": "CVE-2025-9289",
  "lastModified": "2026-03-16T18:06:44.293",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV40": [
      {
        "cvssData": {
          "Automatable": "NOT_DEFINED",
          "Recovery": "NOT_DEFINED",
          "Safety": "NOT_DEFINED",
          "attackComplexity": "HIGH",
          "attackRequirements": "PRESENT",
          "attackVector": "NETWORK",
          "availabilityRequirement": "NOT_DEFINED",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityRequirement": "NOT_DEFINED",
          "exploitMaturity": "NOT_DEFINED",
          "integrityRequirement": "NOT_DEFINED",
          "modifiedAttackComplexity": "NOT_DEFINED",
          "modifiedAttackRequirements": "NOT_DEFINED",
          "modifiedAttackVector": "NOT_DEFINED",
          "modifiedPrivilegesRequired": "NOT_DEFINED",
          "modifiedSubAvailabilityImpact": "NOT_DEFINED",
          "modifiedSubConfidentialityImpact": "NOT_DEFINED",
          "modifiedSubIntegrityImpact": "NOT_DEFINED",
          "modifiedUserInteraction": "NOT_DEFINED",
          "modifiedVulnAvailabilityImpact": "NOT_DEFINED",
          "modifiedVulnConfidentialityImpact": "NOT_DEFINED",
          "modifiedVulnIntegrityImpact": "NOT_DEFINED",
          "privilegesRequired": "LOW",
          "providerUrgency": "NOT_DEFINED",
          "subAvailabilityImpact": "NONE",
          "subConfidentialityImpact": "LOW",
          "subIntegrityImpact": "NONE",
          "userInteraction": "ACTIVE",
          "valueDensity": "NOT_DEFINED",
          "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
          "version": "4.0",
          "vulnAvailabilityImpact": "NONE",
          "vulnConfidentialityImpact": "HIGH",
          "vulnIntegrityImpact": "NONE",
          "vulnerabilityResponseEffort": "NOT_DEFINED"
        },
        "source": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "type": "Secondary"
      }
    ]
  },
  "published": "2026-01-22T22:16:15.787",
  "references": [
    {
      "source": "f23511db-6c3e-4e32-a477-6aa17d310630",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.omadanetworks.com/us/document/114950/"
    },
    {
      "source": "f23511db-6c3e-4e32-a477-6aa17d310630",
      "tags": [
        "Product"
      ],
      "url": "https://support.omadanetworks.com/us/download/"
    }
  ],
  "sourceIdentifier": "f23511db-6c3e-4e32-a477-6aa17d310630",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "f23511db-6c3e-4e32-a477-6aa17d310630",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…