An attacker with access to the web application ZeusWeb of the provider Microcom
(in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microcom360
Microcom360 zeusweb |
|
| CPEs | cpe:2.3:a:microcom360:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom360
Microcom360 zeusweb |
|
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31. | |
| Title | REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T15:44:18.085Z
Reserved: 2025-11-25T09:45:47.332Z
Link: CVE-2025-13649
Updated: 2026-02-11T15:36:59.807Z
Status : Analyzed
Published: 2026-02-11T09:15:49.997
Modified: 2026-03-17T20:24:13.760
Link: CVE-2025-13649
No data.