Metrics
Affected Vendors & Products
No advisories yet.
Solution
The provider has implement the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.
Workaround
No workaround given by the vendor.
Wed, 11 Feb 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31. | |
| Title | REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB | |
| First Time appeared |
Microcom
Microcom zeusweb |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:* | |
| Vendors & Products |
Microcom
Microcom zeusweb |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: HackRTU
Published:
Updated: 2026-02-11T09:05:55.452Z
Reserved: 2025-11-25T09:45:48.429Z
Link: CVE-2025-13650
No data.
Status : Received
Published: 2026-02-11T09:15:50.147
Modified: 2026-02-11T09:15:50.147
Link: CVE-2025-13650
No data.
OpenCVE Enrichment
No data.