FKIE_CVE-2025-9289
Vulnerability from fkie_nvd - Published: 2026-01-22 22:16 - Updated: 2026-03-16 18:06
Severity ?
Summary
A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator’s browser, potentially exposing sensitive information and compromising confidentiality.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| tp-link | omada_controller | * | |
| tp-link | omada_controller | * | |
| tp-link | oc200_firmware | * | |
| tp-link | oc200 | 1 | |
| tp-link | oc220_firmware | * | |
| tp-link | oc220 | 1 | |
| tp-link | oc300_firmware | * | |
| tp-link | oc300 | 1.6 | |
| tp-link | oc400_firmware | * | |
| tp-link | oc400 | 1.6 | |
| tp-link | oc200_firmware | * | |
| tp-link | oc200 | 2 | |
| tp-link | omada_controller | * | |
| tp-link | oc200 | 1 | |
| tp-link | oc200 | 2 | |
| tp-link | oc220 | 1 | |
| tp-link | oc300 | 1.6 | |
| tp-link | oc400 | 1.6 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tp-link:omada_controller:*:*:*:*:-:*:*:*",
"matchCriteriaId": "3B623F6F-B033-44B4-9F50-97CE3C0F84E1",
"versionEndExcluding": "6.0.0.24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:tp-link:omada_controller:*:*:*:*:cloud:*:*:*",
"matchCriteriaId": "DB01AAAF-90A1-4DA2-8810-D5A02D11ABCC",
"versionEndExcluding": "6.0.0.100",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tp-link:oc200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "036DEE09-EB29-4F38-A472-181FE88A1EAC",
"versionEndExcluding": "1.37.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:oc200:1:*:*:*:*:*:*:*",
"matchCriteriaId": "D994D0D1-FE36-4CB9-A641-CAAC8D643783",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tp-link:oc220_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1836F980-6E1F-4305-973E-AB34BD046CFD",
"versionEndExcluding": "1.2.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:oc220:1:*:*:*:*:*:*:*",
"matchCriteriaId": "077DD2BF-32E3-434E-B040-9B4C48F419CA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tp-link:oc300_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1188840C-7B7B-4D07-A4D4-DED7D02E2971",
"versionEndExcluding": "1.31.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:oc300:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8E90417C-17A3-4D55-9764-4EF93D19B610",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tp-link:oc400_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B04AEC9-E614-4C99-98B5-568D845C3153",
"versionEndExcluding": "1.9.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:oc400:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "15655343-B8B7-4C17-8F9B-E90823407861",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tp-link:oc200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F791A1D-CF64-44C9-B17C-FF8632E3B6BF",
"versionEndExcluding": "2.22.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:oc200:2:*:*:*:*:*:*:*",
"matchCriteriaId": "86D6AE05-E5BE-41A6-B3ED-16C5B15BF2A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tp-link:omada_controller:*:*:*:*:-:*:*:*",
"matchCriteriaId": "64544C00-6B20-4320-850B-B83F99D72BC6",
"versionEndExcluding": "6.0.0.34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:oc200:1:*:*:*:*:*:*:*",
"matchCriteriaId": "D994D0D1-FE36-4CB9-A641-CAAC8D643783",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:tp-link:oc200:2:*:*:*:*:*:*:*",
"matchCriteriaId": "86D6AE05-E5BE-41A6-B3ED-16C5B15BF2A2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:tp-link:oc220:1:*:*:*:*:*:*:*",
"matchCriteriaId": "077DD2BF-32E3-434E-B040-9B4C48F419CA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:tp-link:oc300:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8E90417C-17A3-4D55-9764-4EF93D19B610",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:tp-link:oc400:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "15655343-B8B7-4C17-8F9B-E90823407861",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator\u2019s browser, potentially exposing sensitive information and compromising confidentiality."
},
{
"lang": "es",
"value": "Una vulnerabilidad de cross-site scripting (XSS) fue identificada en un par\u00e1metro en los Controladores Omada debido a una sanitizaci\u00f3n de entrada inadecuada. La explotaci\u00f3n requiere condiciones avanzadas, como el posicionamiento en la red o la emulaci\u00f3n de una entidad de confianza, y la interacci\u00f3n del usuario por parte de un administrador autenticado. Si tiene \u00e9xito, un atacante podr\u00eda ejecutar JavaScript arbitrario en el navegador del administrador, exponiendo potencialmente informaci\u00f3n sensible y comprometiendo la confidencialidad."
}
],
"id": "CVE-2025-9289",
"lastModified": "2026-03-16T18:06:44.293",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "f23511db-6c3e-4e32-a477-6aa17d310630",
"type": "Secondary"
}
]
},
"published": "2026-01-22T22:16:15.787",
"references": [
{
"source": "f23511db-6c3e-4e32-a477-6aa17d310630",
"tags": [
"Vendor Advisory"
],
"url": "https://support.omadanetworks.com/us/document/114950/"
},
{
"source": "f23511db-6c3e-4e32-a477-6aa17d310630",
"tags": [
"Product"
],
"url": "https://support.omadanetworks.com/us/download/"
}
],
"sourceIdentifier": "f23511db-6c3e-4e32-a477-6aa17d310630",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "f23511db-6c3e-4e32-a477-6aa17d310630",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…