CVE-2026-8604
Description
In ScadaBR version 1.2.0, a CSRF vulnerability could allow an attacker to trigger any authenticated action through a victim's session by luring any logged-in user to a malicious webpage.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ScadaBR 1.2.0 has a CSRF vulnerability that allows an attacker to trick a logged-in user into executing arbitrary authenticated actions.
Vulnerability
ScadaBR version 1.2.0 contains a Cross-Site Request Forgery (CSRF) vulnerability [1]. The application does not implement anti-CSRF tokens or other mechanisms to verify that authenticated requests originate from the user's intended actions. This allows an attacker to forge requests that mimic any action a legitimate authenticated user can perform. Affected product: ScadaBR version 1.2.0 [1].
Exploitation
An attacker must send a crafted link or host a malicious webpage that, when visited by a logged-in ScadaBR user, triggers an HTTP request to the ScadaBR server [1]. The request will include the user's session cookie and execute any authenticated action the user is authorized to perform. The attacker does not need special network access beyond luring the victim to the page; no user interaction beyond visiting the page is required [1].
Impact
Successful exploitation allows the attacker to trigger any authenticated action on the victim's behalf, including creating, modifying, or deleting configuration data, sensor readings, or user accounts [1]. The impact depends on the privileges of the victim user but could lead to full compromise of the ScadaBR instance, including disruption of industrial control operations [1].
Mitigation
No fix or patched version has been released as of the publication date (2026-05-19) [1]. Users should monitor the ScadaBR project for an update. As a workaround, users can restrict access to the ScadaBR web interface via network segmentation and ensure that operators do not browse untrusted websites while logged in. The CISA advisory recommends implementing anti-CSRF tokens in the application [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
1- ScadaBRCISA ICS Advisories