Description
Reflected Cross-Site Scripting (XSS) on the A3factura web platform, in parameter 'customerVATNumber', in 'a3factura-app.wolterskluwer.es/#/incomes/salesDeliveryNotes' endpoint, which could allow an attacker to execute arbitrary code in the victim's browser.
Published: 2026-02-26
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting (XSS)
Action: Patch
AI Analysis

Impact

The vulnerability is a reflected XSS that occurs in the A3factura web platform when a malicious script is supplied in the customerVATNumber parameter of the incomes/salesDeliveryNotes endpoint. The script is reflected back into the browser’s response and executed with the privileges of the affected user, allowing attackers to run arbitrary client‑side code such as stealing session data or redirecting to malicious sites. Because the injection is reflected, an attacker must embed the payload in a URL that the victim eventually visits.

Affected Systems

This flaw affects the A3factura product, version 4.111.2‑rev.1 and earlier releases until the fix is applied. The vendor has released a corrective update in version 4.114.0‑rev.6, available as of 17 February 2026, which removes the vulnerability.

Risk and Exploitability

The CVSS score of 4.8 indicates a medium risk severity, while the EPSS score of less than 1 % reflects a very low exploitation probability in the current threat landscape. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the victim to visit a crafted URL, making it a remote code execution vectors only within the victim’s browser. The risk is therefore moderate but unlikely to be widely leveraged unless an attacker can target a specific user base with tailored phishing campaigns.

Generated by OpenCVE AI on April 17, 2026 at 14:22 UTC.

Remediation

Vendor Solution

The fix has been deployed in production in version 4.114.0-rev.6, released on 17/02/2026.


OpenCVE Recommended Actions

  • Upgrade to A3factura version 4.114.0‑rev.6 or later to eliminate the vulnerability
  • Ensure the customerVATNumber parameter is server‑side validated and all output is properly encoded to prevent script execution
  • If an immediate upgrade is not possible, restrict external access to the incomes/salesDeliveryNotes endpoint and monitor for suspicious link usage

Generated by OpenCVE AI on April 17, 2026 at 14:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wolterskluwer
Wolterskluwer a3factura
CPEs cpe:2.3:a:wolterskluwer:a3factura:4.111.2:rev.1:*:*:*:*:*:*
Vendors & Products Wolterskluwer
Wolterskluwer a3factura
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Thu, 26 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
Description Reflected Cross-Site Scripting (XSS) on the A3factura web platform, in parameter 'customerVATNumber', in 'a3factura-app.wolterskluwer.es/#/incomes/salesDeliveryNotes' endpoint, which could allow an attacker to execute arbitrary code in the victim's browser.
Title Multiple vulnerabilities in A3factura software
First Time appeared A3factura
A3factura a3factura
Weaknesses CWE-79
CPEs cpe:2.3:a:a3factura:a3factura:4.111.2-rev.1:*:*:*:*:*:*:*
Vendors & Products A3factura
A3factura a3factura
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

A3factura A3factura
Wolterskluwer A3factura
cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2026-02-26T14:04:31.184Z

Reserved: 2026-02-18T11:25:14.228Z

Link: CVE-2026-2680

cve-icon Vulnrichment

Updated: 2026-02-26T14:04:26.796Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-26T13:16:17.253

Modified: 2026-03-02T16:32:48.863

Link: CVE-2026-2680

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:30:20Z

Weaknesses