A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required.

Project Subscriptions

Vendors Products
Tp-link Subscribe
Kidshield Subscribe
Omada Cloud Controller Subscribe
Omada Guard Subscribe
Tp-partner Subscribe
Tpcamera Subscribe
Wi-fi Navi Subscribe
Wifi Toolkit Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link aginet
Tp-link deco
Tp-link festa
Tp-link kasa
Tp-link kidshield
Tp-link omada
Tp-link omada Guard
Tp-link tapo
Tp-link tether
Tp-link tp-partner
Tp-link tpcamera
Tp-link vigi
Tp-link wi-fi Navi
Tp-link wifi Toolkit
CPEs cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*
Vendors & Products Tp-link aginet
Tp-link deco
Tp-link festa
Tp-link kasa
Tp-link kidshield
Tp-link omada
Tp-link omada Guard
Tp-link tapo
Tp-link tether
Tp-link tp-partner
Tp-link tpcamera
Tp-link vigi
Tp-link wi-fi Navi
Tp-link wifi Toolkit
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 13 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link omada Cloud Controller
Vendors & Products Tp-link
Tp-link omada Cloud Controller

Fri, 13 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required.
Title Permissive Web Security Policy Allows Cross-Origin Access Control Bypass on Omada Cloud Controllers
Weaknesses CWE-942
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-02-13T22:09:17.957Z

Reserved: 2025-08-20T22:24:24.501Z

Link: CVE-2025-9292

cve-icon Vulnrichment

Updated: 2026-02-13T13:18:23.720Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-13T02:16:45.937

Modified: 2026-04-01T20:52:43.110

Link: CVE-2025-9292

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-13T21:28:53Z

Weaknesses