An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL:  https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.

Project Subscriptions

Vendors Products
Microcom Subscribe
Zeusweb Subscribe
Advisories

No advisories yet.

Fixes

Solution

The provider has implement the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.


Workaround

No workaround given by the vendor.

History

Wed, 11 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL:  https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.
Title REFLECTED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB
First Time appeared Microcom
Microcom zeusweb
Weaknesses CWE-79
CPEs cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:*
Vendors & Products Microcom
Microcom zeusweb
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: HackRTU

Published:

Updated: 2026-02-11T15:44:12.006Z

Reserved: 2025-11-25T09:45:48.429Z

Link: CVE-2025-13650

cve-icon Vulnrichment

Updated: 2026-02-11T15:36:58.419Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-11T09:15:50.147

Modified: 2026-02-11T15:27:26.370

Link: CVE-2025-13650

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses