Description
A vulnerability was identified in BichitroGan ISP Billing Software 2025.3.20. This affects an unknown function of the file /?\_route=customers/edit/ of the component Customer Handler. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch or Mitigate
AI Analysis

Impact

The vulnerability resides in an unknown function of the /?route=customers/edit page within the Customer Handler component of BichitroGan ISP Billing Software 2025.3.20. It allows an attacker to inject malicious script code that is executed in users' browsers when they view edited customer data. This classic cross‑site scripting flaw (CWE‑79) is coupled with a potential server‑side code execution indication (CWE‑94). The primary impact is execution of arbitrary client‑side code leading to session hijacking, phishing, or site defacement, thereby compromising confidentiality and integrity of user sessions.

Affected Systems

The affected product is BichitroGan ISP Billing Software 2025.3.20. No sub‑components or alternate versions are listed; any instance of the Customer edit route exposed to external traffic is vulnerable.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate impact and requires remote interaction. EPSS information is not available, so exact exploitation probability cannot be quantified, though a public exploit demonstrates feasibility. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote via a crafted request to the edit customer route, impacting any user that views responses containing injected script.

Generated by OpenCVE AI on April 20, 2026 at 10:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑issued patch or upgrade to a non‑vulnerable version of BichitroGan ISP Billing Software if one has been released
  • If no patch is available, implement rigorous input validation or output encoding on the customer edit form to neutralize script payloads
  • Limit access to the edit customer page to users with administrative or billing privileges, and enforce least‑privilege access controls to reduce exposure

Generated by OpenCVE AI on April 20, 2026 at 10:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Bichitrogan
Bichitrogan isp Billing Software
Vendors & Products Bichitrogan
Bichitrogan isp Billing Software

Mon, 20 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in BichitroGan ISP Billing Software 2025.3.20. This affects an unknown function of the file /?\_route=customers/edit/ of the component Customer Handler. Such manipulation leads to cross site scripting. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title BichitroGan ISP Billing Software Customer edit cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bichitrogan Isp Billing Software
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T11:10:22.776Z

Reserved: 2026-04-19T16:32:13.685Z

Link: CVE-2026-6622

cve-icon Vulnrichment

Updated: 2026-04-20T11:10:18.131Z

cve-icon NVD

Status : Received

Published: 2026-04-20T10:16:17.207

Modified: 2026-04-20T10:16:17.207

Link: CVE-2026-6622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:57:58Z

Weaknesses