Description
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
Published: 2026-04-02
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Client‑side script execution via browser
Action: Immediate Patch
AI Analysis

Impact

Multiple reflected Cross–Site Scripting vulnerabilities exist in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite 17.0, allowing attackers to inject malicious JavaScript via the codice_azienda and red_url parameters. This flaw permits arbitrary script execution in a victim's browser, which can lead to session hijacking, credential theft, defacement, or redirect to malicious sites. The vulnerability is classified as CWE-79 and can compromise the confidentiality, integrity, and availability of information from the end users perspective.

Affected Systems

Interzen Consulting’s ZenShare Suite includes multiple applications: ZenCRM, ZenHR, ZenProject, and ZenPurchase, all running version 17.0. The login.php endpoint present in each product is affected, meaning that any user interacting with any of these applications via the login page is vulnerable.

Risk and Exploitability

The CVSS base score of 6.1 indicates a moderate risk. The EPSS score of less than 1% suggests a low likelihood of current exploits, and the vulnerability is not listed in CISA’s KEV catalog. Despite the low exploitation probability, the attack vector is remote and trivial because an attacker only needs to supply a crafted URL. By directing a user to a malicious link containing payloads in the codice_azienda or red_url parameters, the attacker can execute JavaScript in the browser context. Once the script runs, it can exfiltrate session cookies or perform actions on behalf of the user.

Generated by OpenCVE AI on April 10, 2026 at 17:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Interzen ZenShare Suite to a patched version (e.g., 17.1 or later) that resolves the XSS flaw.
  • If a patch is unavailable, sanitize or encode the codice_azienda and red_url parameters before rendering them back to the user.
  • Implement a Content Security Policy header to restrict script execution from untrusted sources.
  • Validate user input server‑side to reject malformed or malicious values for the affected parameters.

Generated by OpenCVE AI on April 10, 2026 at 17:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 13 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
Title Reflected Cross‑Site Scripting in Interzen ZenShare Suite 17.0 Login Endpoint

Fri, 10 Apr 2026 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Interzen
Interzen zencrm
Interzen zenhr
Interzen zenproject
Interzen zenpurchase
CPEs cpe:2.3:a:interzen:zencrm:17.0:*:*:*:*:*:*:*
cpe:2.3:a:interzen:zenhr:17.0:*:*:*:*:*:*:*
cpe:2.3:a:interzen:zenproject:17.0:*:*:*:*:*:*:*
cpe:2.3:a:interzen:zenpurchase:17.0:*:*:*:*:*:*:*
Vendors & Products Interzen
Interzen zencrm
Interzen zenhr
Interzen zenproject
Interzen zenpurchase

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS in ZenShare Suite Login Endpoint

Fri, 03 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Reflected XSS in ZenShare Suite Login Endpoint
First Time appeared Interzen Consulting
Interzen Consulting zenshare Suite
Weaknesses CWE-79
Vendors & Products Interzen Consulting
Interzen Consulting zenshare Suite

Thu, 02 Apr 2026 20:45:00 +0000

Type Values Removed Values Added
Description Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
References

Subscriptions

Interzen Zencrm Zenhr Zenproject Zenpurchase
Interzen Consulting Zenshare Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-03T14:40:38.853Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-30252

cve-icon Vulnrichment

Updated: 2026-04-03T14:40:31.434Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-02T21:16:40.490

Modified: 2026-04-10T15:50:06.950

Link: CVE-2026-30252

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:28:06Z

Weaknesses