Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus.svc/json/savesoldoc_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
There is no solution reported at this time.
Workaround
No workaround given by the vendor.
References
History
Tue, 18 Nov 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus.svc/json/savesoldoc_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details. | |
| Title | Stored Cross-Site Scripting (XSS) in WinPlus by Informática del Este | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-11-18T11:27:42.348Z
Reserved: 2025-04-16T09:57:03.671Z
Link: CVE-2025-41350
No data.
Status : Received
Published: 2025-11-18T12:15:46.037
Modified: 2025-11-18T12:15:46.037
Link: CVE-2025-41350
No data.
OpenCVE Enrichment
No data.