Vulnerability Description
A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Aginet | < 2.13.6 |
| Tp-Link | Deco | < 3.9.163 |
| Tp-Link | Festa | < 1.7.1 |
| Tp-Link | Kasa | < 3.4.350 |
| Tp-Link | Kidshield | < 1.1.21 |
| Tp-Link | Omada | < 4.25.25 |
| Tp-Link | Omada Guard | < 1.1.28 |
| Tp-Link | Tapo | < 3.14.111 |
| Tp-Link | Tether | < 4.12.27 |
| Tp-Link | Tp-Partner | < 2.0.1 |
| Tp-Link | Tpcamera | < 3.2.17 |
| Tp-Link | Vigi | < 2.7.70 |
| Tp-Link | Wi-Fi Navi | < 1.5.5 |
| Tp-Link | Wifi Toolkit | < 1.4.28 |
Related Weaknesses (CWE)
References
- https://www.omadanetworks.com/us/support/faq/4969/Vendor Advisory
- https://www.tp-link.com/us/support/faq/4969/Vendor Advisory
FAQ
What is CVE-2025-9292?
CVE-2025-9292 is a vulnerability with a CVSS score of 7.5 (HIGH). A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing ...
How severe is CVE-2025-9292?
CVE-2025-9292 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-9292?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Aginet, Tp-Link Deco, Tp-Link Festa, Tp-Link Kasa, Tp-Link Kidshield.