An attacker with access to the web application ZeusWeb of the provider Microcom
(in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31. | |
| Title | REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T09:05:28.204Z
Reserved: 2025-11-25T09:45:47.332Z
Link: CVE-2025-13649
No data.
Status : Received
Published: 2026-02-11T09:15:49.997
Modified: 2026-02-11T09:15:49.997
Link: CVE-2025-13649
No data.