Description
Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL in 'site' parameter in 'app_login.php'.
Published: 2026-03-26
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (Reflected XSS)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a reflected Cross‑Site Scripting (XSS) flaw in the GDTaller application. An attacker can supply a specially crafted URL that contains a malicious JavaScript payload in the 'site' parameter of 'app_login.php'. When the victim visits that URL, the script executes within the victim’s browser context, allowing the attacker to execute arbitrary code, steal cookies, hijack sessions, or deface the site. The flaw does not affect server‑side state or data integrity directly, but it provides a foothold for further client‑side attacks.

Affected Systems

The flaw is present in the GDTaller application, and affected versions are not explicitly listed in the advisory. The vendor indicates that the issue has been fixed in the current release. Administrators should verify that their deployments are running the patched version, or otherwise identify the specific version in use.

Risk and Exploitability

The CVSS score of 5.1 classifies the severity as moderate, and an EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to visit a malicious link, making it a drive‑by or phishing vector that is easy to deliver but limited to users who click the URL. Because the flaw provides a client‑side execution path, the potential impact on confidentiality and integrity can be significant if combined with social engineering.

Generated by OpenCVE AI on March 27, 2026 at 19:26 UTC.

Remediation

Vendor Solution

The vulnerabilities has been fixed by the GDTaller team in the current version.


OpenCVE Recommended Actions

  • Update GDTaller to the latest release where this issue has been addressed.

Generated by OpenCVE AI on March 27, 2026 at 19:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Mar 2026 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gdtaller:gdtaller:-:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Thu, 26 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Description Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL en  'site' parameter in 'app_login.php'. Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL in 'site' parameter in 'app_login.php'.

Thu, 26 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL en  'site' parameter in 'app_login.php'.
Title Multiple vulnerabilities in GDTaller
First Time appeared Gdtaller
Gdtaller gdtaller
Weaknesses CWE-79
CPEs cpe:2.3:a:gdtaller:gdtaller:*:*:*:*:*:*:*:*
Vendors & Products Gdtaller
Gdtaller gdtaller
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Gdtaller Gdtaller
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-03-26T13:23:17.835Z

Reserved: 2025-04-16T09:09:26.929Z

Link: CVE-2025-41026

cve-icon Vulnrichment

Updated: 2026-03-26T13:23:14.303Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T13:16:24.903

Modified: 2026-03-27T18:28:50.783

Link: CVE-2025-41026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T20:26:15Z

Weaknesses