Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-11089 | An authenticated attacker can achieve stored XSS by exploiting improper sanitization of the plant name value while adding or editing a plant. |
Solution
Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions: * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.) * Use strong passwords and enable multi-factor authentication where applicable. * Report any security concerns to Service@Growatt.com. * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity.
Workaround
No workaround given by the vendor.
Wed, 12 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Growatt
Growatt cloud Portal |
|
| CPEs | cpe:2.3:a:growatt:cloud_portal:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Growatt
Growatt cloud Portal |
Wed, 16 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 15 Apr 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated attacker can achieve stored XSS by exploiting improper sanitization of the plant name value while adding or editing a plant. | |
| Title | Growatt Cloud Applications Cross-site Scripting | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T15:46:18.058Z
Reserved: 2025-04-01T17:44:07.325Z
Link: CVE-2025-30511
Updated: 2025-04-16T14:38:00.716Z
Status : Analyzed
Published: 2025-04-15T21:15:56.953
Modified: 2025-11-12T18:48:55.190
Link: CVE-2025-30511
No data.
OpenCVE Enrichment
No data.
EUVD