Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus. svc/json/savesolpla_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
There is no solution reported at this time.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Nov 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus. svc/json/savesolpla_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details. | |
| Title | Stored Cross-Site Scripting (XSS) in WinPlus by Informática del Este | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-11-18T11:29:53.609Z
Reserved: 2025-04-16T09:57:03.670Z
Link: CVE-2025-41349
No data.
Status : Received
Published: 2025-11-18T12:15:45.843
Modified: 2025-11-18T12:15:45.843
Link: CVE-2025-41349
No data.
OpenCVE Enrichment
No data.