Reflected XSS using a specific URL in Automated Logic WebCTRL and Carrier i-VU can allow delivery of malicious payload due to a specific GET parameter not being sanitized.
Advisories

No advisories yet.

Fixes

Solution

These vulnerabilities have been remediated in cumulative releases for versions 8.0, 8.5, and 9.0. Please be aware that WebCTRL and i-Vu versions 7.0, 6.5, and 6.1 are no longer supported. To safeguard against these vulnerabilities, upgrading to the latest WebCTRL and i-Vu software is strongly recommended.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 19 Nov 2025 13:30:00 +0000

Type Values Removed Values Added
Description Reflected XSS using a specific URL in Automated Logic WebCTRL and Carrier i-VU can allow delivery of malicious payload due to a specific GET parameter not being sanitized.
Title ALC WebCTRL Carrier i-Vu Reflected XSS due to unsanitized parameter
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.4, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Carrier

Published:

Updated: 2025-11-19T15:15:57.698Z

Reserved: 2024-09-06T16:01:34.807Z

Link: CVE-2024-8528

cve-icon Vulnrichment

Updated: 2025-11-19T15:15:10.301Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-19T14:15:57.780

Modified: 2025-11-19T19:14:59.327

Link: CVE-2024-8528

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.