Description
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
Published: 2026-04-02
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting in the user browser
Action: Apply patch
AI Analysis

Impact

The vulnerability is a reflected cross‑site scripting flaw located in the login.php endpoint of ZenShare Suite. Attackers can embed malicious JavaScript code in the codice_azienda and red_url query parameters. When an authenticated or unauthenticated user visits a crafted URL, the script is executed within the context of the victim’s browser, enabling the attacker to steal session cookies, deface the page or defraud users. The weakness is a typical input validation problem that falls under a reflected XSS (CWE‑79).

Affected Systems

Interzen Consulting S.r.l provides ZenShare Suite, specifically version 17.0. This is the sole version indicated as affected; any installations using that version are at risk.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity, while the EPSS score of less than 1% suggests low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog. Inference from the description indicates that an attacker must construct a malicious URL and entice a user to click it; once triggered, the malicious script runs, but the exploit is limited to actions a browser script can perform, with no direct remote code execution on the server. The attack vector is likely remote via HTTP requests to the login endpoint, with the prerequisite that a user accesses the crafted link.

Generated by OpenCVE AI on April 3, 2026 at 17:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If an official patch is available, upgrade ZenShare Suite to the fixed version as soon as possible.
  • If the patch cannot be applied, restrict the login.php endpoint to authenticated traffic only or disable acceptance of the codice_azienda and red_url parameters via server configuration or URL rewriting.
  • Deploy a web application firewall rule that blocks query strings containing script delimiters or known XSS payload patterns before the request reaches the application.
  • Implement a Content Security Policy in the web application headers to mitigate the impact of any residual reflected XSS attempts.

Generated by OpenCVE AI on April 3, 2026 at 17:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS in ZenShare Suite Login Endpoint

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Reflected XSS in ZenShare Suite Login Endpoint
First Time appeared Interzen Consulting
Interzen Consulting zenshare Suite
Weaknesses CWE-79
Vendors & Products Interzen Consulting
Interzen Consulting zenshare Suite

Thu, 02 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
References

Subscriptions

Interzen Consulting Zenshare Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T14:40:38.853Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30252

cve-icon Vulnrichment

Updated: 2026-04-03T14:40:31.434Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-02T21:16:40.490

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-30252

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:17:19Z

Weaknesses