An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html  resulting in a stored XSS. This issue affects ZeusWeb: 6.1.31.
History

Wed, 11 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html  resulting in a stored XSS. This issue affects ZeusWeb: 6.1.31.
Title STORED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB
First Time appeared Microcom
Microcom zeusweb
Weaknesses CWE-79
CPEs cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:*
Vendors & Products Microcom
Microcom zeusweb
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HackRTU

Published:

Updated: 2026-02-11T09:05:07.289Z

Reserved: 2025-11-25T09:45:45.902Z

Link: CVE-2025-13648

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-11T09:15:49.793

Modified: 2026-02-11T09:15:49.793

Link: CVE-2025-13648

cve-icon Redhat

No data.