Impact
The vulnerability is a reflected cross‑site scripting flaw located in the login.php endpoint of ZenShare Suite. Attackers can embed malicious JavaScript code in the codice_azienda and red_url query parameters. When an authenticated or unauthenticated user visits a crafted URL, the script is executed within the context of the victim’s browser, enabling the attacker to steal session cookies, deface the page or defraud users. The weakness is a typical input validation problem that falls under a reflected XSS (CWE‑79).
Affected Systems
Interzen Consulting S.r.l provides ZenShare Suite, specifically version 17.0. This is the sole version indicated as affected; any installations using that version are at risk.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity, while the EPSS score of less than 1% suggests low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog. Inference from the description indicates that an attacker must construct a malicious URL and entice a user to click it; once triggered, the malicious script runs, but the exploit is limited to actions a browser script can perform, with no direct remote code execution on the server. The attack vector is likely remote via HTTP requests to the login endpoint, with the prerequisite that a user accesses the crafted link.
OpenCVE Enrichment