An attacker with access to the web application ZeusWeb of the provider Microcom

(in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Advisories

No advisories yet.

Fixes

Solution

The provider has implement the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.


Workaround

No workaround given by the vendor.

History

Tue, 17 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Microcom360
Microcom360 zeusweb
CPEs cpe:2.3:a:microcom360:zeusweb:6.1.31:*:*:*:*:*:*:*
Vendors & Products Microcom360
Microcom360 zeusweb
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Title REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB
First Time appeared Microcom
Microcom zeusweb
Weaknesses CWE-79
CPEs cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:*
Vendors & Products Microcom
Microcom zeusweb
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: HackRTU

Published:

Updated: 2026-02-11T15:44:18.085Z

Reserved: 2025-11-25T09:45:47.332Z

Link: CVE-2025-13649

cve-icon Vulnrichment

Updated: 2026-02-11T15:36:59.807Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-11T09:15:49.997

Modified: 2026-03-17T20:24:13.760

Link: CVE-2025-13649

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-11T21:45:54Z

Weaknesses