Description
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.
Published: 2026-04-02
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side Script Execution
Action: Patch Immediately
AI Analysis

Impact

A reflected cross‑site scripting vulnerability exists in the login_newpwd.php endpoint of ZenShare Suite. By including a malicious value in the codice_azienda parameter, an attacker can inject and execute arbitrary JavaScript in the victim’s browser. This allows the attacker to steal session cookies, perform phishing or other client‑side abuses within the context of the logged‑in user.

Affected Systems

This flaw affects Interzen Consulting S.r.l ZenShare Suite version 17.0. No other versions are listed as vulnerable in the current advisory.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.1, indicating moderate severity, and an EPSS score of less than 1 %, suggesting low exploit probability. It is not recorded in the CISA KEV catalog. Attackers can exploit the flaw by simply visiting a crafted URL; authentication is not required. Given these metrics, the overall risk remains moderate, but the availability of an exploit vector warrants immediate attention.

Generated by OpenCVE AI on April 9, 2026 at 02:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s patch for ZenShare Suite v17.0 or upgrade to a version where the issue is resolved.
  • If a patch is not yet released, modify the application to properly sanitize or encode the codice_azienda parameter, or otherwise ensure it cannot contain executable scripts.
  • If the login_newpwd.php endpoint is not required for public access, restrict its usage to authenticated sessions or internal traffic only.
  • Enforce HTTPS on all traffic to prevent tampering and serve all content over a secure channel.

Generated by OpenCVE AI on April 9, 2026 at 02:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS via injected codice_azienda in ZenShare Suite login endpoint

Thu, 09 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
First Time appeared Interzen
Interzen zenshare Suite
CPEs cpe:2.3:a:interzen:zenshare_suite:17.0:*:*:*:*:*:*:*
Vendors & Products Interzen
Interzen zenshare Suite

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS in ZenShare Suite 17.0 Login Endpoint

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Reflected XSS in ZenShare Suite 17.0 Login Endpoint
First Time appeared Interzen Consulting
Interzen Consulting zenshare Suite
Weaknesses CWE-79
Vendors & Products Interzen Consulting
Interzen Consulting zenshare Suite

Thu, 02 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.
References

Subscriptions

Interzen Zenshare Suite
Interzen Consulting Zenshare Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T14:39:19.366Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30251

cve-icon Vulnrichment

Updated: 2026-04-03T14:38:50.405Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T21:16:40.357

Modified: 2026-04-09T01:10:50.147

Link: CVE-2026-30251

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:29:24Z

Weaknesses