Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus.svc/json/savesoldoc_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.
Advisories

No advisories yet.

Fixes

Solution

There is no solution reported at this time.


Workaround

No workaround given by the vendor.

History

Wed, 19 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Iest
Iest winplus
CPEs cpe:2.3:a:iest:winplus:24.11.27:*:*:*:-:*:*:*
Vendors & Products Iest
Iest winplus
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Wed, 19 Nov 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Informatica Del Este
Informatica Del Este winplus
Vendors & Products Informatica Del Este
Informatica Del Este winplus

Tue, 18 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 11:30:00 +0000

Type Values Removed Values Added
Description Stored Cross-site Scripting (XSS)vylnerability type in WinPlus v24.11.27 byInformática del Este that consist of an stored XSS of a stored XSS due to a lack of proper validation of user input by sending a POST request using the 'descripcion' parameter in '/WinplusPortal/ws/sWinplus.svc/json/savesoldoc_post'. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.
Title Stored Cross-Site Scripting (XSS) in WinPlus by Informática del Este
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-11-18T19:26:49.005Z

Reserved: 2025-04-16T09:57:03.671Z

Link: CVE-2025-41350

cve-icon Vulnrichment

Updated: 2025-11-18T19:26:28.270Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-18T12:15:46.037

Modified: 2025-11-19T19:11:04.310

Link: CVE-2025-41350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-19T10:47:57Z

Weaknesses