An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Metrics
Affected Vendors & Products
References
History
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31. | |
| Title | REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T09:05:55.452Z
Reserved: 2025-11-25T09:45:48.429Z
Link: CVE-2025-13650
No data.
Status : Received
Published: 2026-02-11T09:15:50.147
Modified: 2026-02-11T09:15:50.147
Link: CVE-2025-13650
No data.