An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL:  https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
History

Wed, 11 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL:  https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Title REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB
First Time appeared Microcom
Microcom zeusweb
Weaknesses CWE-79
CPEs cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:*
Vendors & Products Microcom
Microcom zeusweb
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: HackRTU

Published:

Updated: 2026-02-11T09:05:55.452Z

Reserved: 2025-11-25T09:45:48.429Z

Link: CVE-2025-13650

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-11T09:15:50.147

Modified: 2026-02-11T09:15:50.147

Link: CVE-2025-13650

cve-icon Redhat

No data.