Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41349: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Informatica del Este WinPlus

0
Medium
VulnerabilityCVE-2025-41349cvecve-2025-41349cwe-79
Published: Tue Nov 18 2025 (11/18/2025, 11:26:23 UTC)
Source: CVE Database V5
Vendor/Project: Informatica del Este
Product: WinPlus

Description

Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus. svc/json/savesolpla_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/18/2026, 13:50:53 UTC

Technical Analysis

CVE-2025-41349 is a stored Cross-site Scripting (XSS) vulnerability classified under CWE-79, identified in Informatica del Este's WinPlus software version 24.11.27. The vulnerability stems from inadequate sanitization and validation of user-supplied input in the 'descripcion' parameter within a POST request to the '/WinplusPortal/ws/sWinplus.svc/json/savesolpla_post' endpoint. Because the input is stored and later rendered in web pages without proper neutralization, an attacker with authenticated access can inject malicious JavaScript code. When other users view the affected page or data, the injected script executes in their browsers, allowing the attacker to steal session cookies or perform actions on behalf of the victim. The CVSS 4.0 score of 5.1 reflects a medium severity, with attack vector being network-based, low attack complexity, no privileges required beyond authentication, and user interaction needed. The vulnerability does not affect confidentiality, integrity, or availability of the system directly but compromises user session confidentiality and integrity. No public exploits are currently known, but the vulnerability could be leveraged in targeted attacks against organizations using this software. The lack of available patches increases the urgency for organizations to implement compensating controls. This vulnerability highlights the importance of rigorous input validation and output encoding in web applications, especially those handling sensitive business data.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to session hijacking, unauthorized access, and potential lateral movement within networks if attackers leverage stolen credentials. This risk is particularly acute for sectors relying on WinPlus for critical business processes, such as manufacturing, logistics, or utilities, where session compromise could disrupt operations or lead to data breaches. The stored nature of the XSS means that malicious scripts persist and can affect multiple users, increasing the attack surface. Confidentiality of user sessions is at risk, potentially exposing sensitive business information. While the vulnerability does not directly impact system availability or data integrity, the indirect effects of compromised user accounts could be severe. Organizations with remote or hybrid workforces using WinPlus are more vulnerable due to increased network exposure. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially from targeted attackers. Failure to address this vulnerability could result in regulatory non-compliance under GDPR if personal data is compromised.

Mitigation Recommendations

Organizations should immediately audit their use of WinPlus version 24.11.27 and restrict access to the vulnerable endpoint where possible. Implement strict server-side input validation and output encoding for the 'descripcion' parameter to neutralize malicious scripts. Deploy Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. Monitor web server logs for unusual POST requests targeting '/WinplusPortal/ws/sWinplus.svc/json/savesolpla_post' and anomalous user behavior indicative of session hijacking. Enforce multi-factor authentication (MFA) to reduce the impact of stolen session cookies. Educate users about the risks of interacting with suspicious links or content within the application. If possible, isolate WinPlus instances in segmented network zones to limit lateral movement. Engage with Informatica del Este for official patches or updates and apply them promptly once available. Consider deploying Web Application Firewalls (WAF) with custom rules to detect and block XSS payloads targeting this endpoint. Regularly review and update incident response plans to include scenarios involving XSS exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:57:03.670Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691c5b0103ddb54749becbf5

Added to database: 11/18/2025, 11:39:45 AM

Last enriched: 2/18/2026, 1:50:53 PM

Last updated: 3/21/2026, 6:20:48 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses