Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13648: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Microcom ZeusWeb

0
Medium
VulnerabilityCVE-2025-13648cvecve-2025-13648cwe-79
Published: Wed Feb 11 2026 (02/11/2026, 09:05:07 UTC)
Source: CVE Database V5
Vendor/Project: Microcom
Product: ZeusWeb

Description

An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html  resulting in a stored XSS. This issue affects ZeusWeb: 6.1.31.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 09:51:33 UTC

Technical Analysis

CVE-2025-13648 is a stored cross-site scripting (XSS) vulnerability identified in Microcom's ZeusWeb version 6.1.31. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), specifically within the 'Name' and 'Surname' parameters in the 'My Account' section of the web application accessible at https://zeus.microcom.es:4040/administracion-estaciones.html. An attacker who is authenticated and has access to the application can inject arbitrary JavaScript code into these fields. Because the injected script is stored persistently, it will be executed in the browsers of other users who view the affected pages, potentially compromising their sessions or stealing sensitive information. The vulnerability requires the attacker to have low privileges (authenticated user) and user interaction (victim must view the malicious content). The CVSS 4.8 score reflects network attack vector, low attack complexity, no privileges required beyond authentication, and low impact on confidentiality and integrity but limited availability impact. No public exploits are known at this time. The vulnerability affects only version 6.1.31 of ZeusWeb, a product by Microcom, which is a web-based management system likely used in industrial or infrastructure contexts. The issue stems from insufficient input validation and output encoding of user-supplied data, allowing script injection. This vulnerability could be leveraged for session hijacking, phishing, or unauthorized actions within the application context.

Potential Impact

For European organizations using Microcom ZeusWeb 6.1.31, this vulnerability poses a moderate risk. Exploitation could lead to unauthorized script execution in users' browsers, enabling session hijacking, credential theft, or manipulation of user actions within the application. This could compromise the integrity and confidentiality of sensitive data managed by ZeusWeb, especially if used in critical infrastructure or industrial environments. The requirement for authentication limits exposure but insider threats or compromised accounts could be leveraged to exploit this vulnerability. The persistent nature of the XSS increases the risk of widespread impact within an organization. Additionally, exploitation could facilitate further attacks such as lateral movement or privilege escalation. The lack of known exploits reduces immediate risk but does not eliminate the threat. Organizations in sectors like energy, manufacturing, or utilities using ZeusWeb should be particularly vigilant due to the potential operational impact.

Mitigation Recommendations

1. Apply strict input validation on the 'Name' and 'Surname' fields to reject or sanitize any input containing script or HTML elements. 2. Implement proper output encoding/escaping on all user-supplied data before rendering it in web pages to prevent script execution. 3. Restrict user privileges to the minimum necessary to reduce the risk of malicious input from authenticated users. 4. Monitor application logs and user activity for unusual behavior indicative of XSS exploitation attempts. 5. If possible, upgrade to a patched version of ZeusWeb once available or contact Microcom for vendor-provided fixes. 6. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. 7. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the application. 8. Conduct regular security assessments and penetration testing focusing on input validation and XSS vulnerabilities in ZeusWeb deployments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HackRTU
Date Reserved
2025-11-25T09:45:45.902Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698c48e04b57a58fa1864cfa

Added to database: 2/11/2026, 9:16:16 AM

Last enriched: 2/18/2026, 9:51:33 AM

Last updated: 3/28/2026, 9:25:31 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses