An attacker with access to the web application ZeusWeb of the provider Microcom
(in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html resulting in a stored XSS.
This issue affects ZeusWeb: 6.1.31.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html resulting in a stored XSS. This issue affects ZeusWeb: 6.1.31. | |
| Title | STORED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T09:05:07.289Z
Reserved: 2025-11-25T09:45:45.902Z
Link: CVE-2025-13648
No data.
Status : Received
Published: 2026-02-11T09:15:49.793
Modified: 2026-02-11T09:15:49.793
Link: CVE-2025-13648
No data.