Description
Blesta 3.x through 5.x before 5.13.3 mishandles input validation, aka CORE-5665.
Published: 2026-02-03
Score: 4.7 Medium
EPSS: 2.5% Low
KEV: No
Impact: Cross‑Site Scripting
Action: Apply patch
AI Analysis

Impact

The vendor has identified an input validation flaw in Blesta versions 3.x through 5.x prior to 5.13.3. This weakness, cataloged as CWE‑79, allows an attacker to inject malicious JavaScript or other code through crafted input that is not correctly sanitized. The result can be a traditional client‑side cross‑site scripting (XSS) attack, where an attacker can deface a page, steal session cookies, or perform other client‑side compromise tasks. The vulnerability does not directly grant an attacker arbitrary code execution on the server, but it can be used to facilitate phishing or other attacks against end‑users that visit the affected pages.

Affected Systems

The crafted input logic is used in the Blesta billing and support web application, owned by the Blesta company. Affected versions include the whole 3.x series and 5.x series before the 5.13.3 release. All deployments of these releases are potentially vulnerable unless patches beyond 5.13.3 are applied.

Risk and Exploitability

The CVSS score of 4.7 indicates a moderate severity. An EPSS probability of 2% suggests that, while the flaw has a tangible chance of exploitation, it is not a high‑risk target compared to other vulnerabilities. It is not listed in the CISA KEV catalog, meaning there are no confirmed widespread exploits at this time. The typical attack path involves an attacker supplying malicious payloads through the web interface, which are then reflected in the browser. Because the flaw tamps user input handling, it is generally exploitable remotely via standard HTTP requests to the affected application.

Generated by OpenCVE AI on April 18, 2026 at 00:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Blesta to version 5.13.3 or later as advised in the vendor advisory.
  • If patching is delayed, implement input sanitization or content security policy to mitigate XSS exposure, following the guidance in the advisories.
  • Monitor application logs for abnormal input patterns and ensure that the web server configuration blocks scripts from executing within allowed directories.

Generated by OpenCVE AI on April 18, 2026 at 00:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
Title Blesta Input Validation XSS Vulnerability

Wed, 18 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
First Time appeared Phillipsdata
Phillipsdata blesta
CPEs cpe:2.3:a:phillipsdata:blesta:*:*:*:*:*:*:*:*
Vendors & Products Phillipsdata
Phillipsdata blesta

Thu, 05 Feb 2026 07:30:00 +0000

Type Values Removed Values Added
References

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Blesta
Blesta blesta
Vendors & Products Blesta
Blesta blesta

Tue, 03 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
Description Blesta 3.x through 5.x before 5.13.3 mishandles input validation, aka CORE-5665.
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Blesta Blesta
Phillipsdata Blesta
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-05T06:19:50.117Z

Reserved: 2026-02-03T19:21:14.218Z

Link: CVE-2026-25616

cve-icon Vulnrichment

Updated: 2026-02-05T06:19:50.117Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T20:15:59.240

Modified: 2026-02-18T18:44:31.383

Link: CVE-2026-25616

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:15:31Z

Weaknesses