Cross-site Scripting (XSS) vulnerability reflected in xCally's Omnichannel v3.30.1. This vulnerability allowsan attacker to executed JavaScript code in the victim's browser by sending them a malicious URL using the 'failureMessage' parameter in '/login'. This vulnerability can be exploited to steal sentitive user data, such as session cookies , or to perform actions on behalf of the user.
Advisories

No advisories yet.

Fixes

Solution

There is no solution reported at this time.


Workaround

No workaround given by the vendor.

History

Thu, 13 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 13:15:00 +0000

Type Values Removed Values Added
Description Cross-site Scripting (XSS) vulnerability reflected in xCally's Omnichannel v3.30.1. This vulnerability allowsan attacker to executed JavaScript code in the victim's browser by sending them a malicious URL using the 'failureMessage' parameter in '/login'. This vulnerability can be exploited to steal sentitive user data, such as session cookies , or to perform actions on behalf of the user.
Title Cross-Site Scripting (XSS) in xCally Omnichannel
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-11-13T20:22:57.206Z

Reserved: 2025-04-16T08:38:16.029Z

Link: CVE-2025-40681

cve-icon Vulnrichment

Updated: 2025-11-13T20:22:54.010Z

cve-icon NVD

Status : Received

Published: 2025-11-13T13:15:45.537

Modified: 2025-11-13T13:15:45.537

Link: CVE-2025-40681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.