Description
A vulnerability has been found in WebSystems WebTOTUM 2026. This impacts an unknown function of the component Calendar. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Published: 2026-04-21
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (XSS)
Action: Immediate Patch
AI Analysis

Impact

A vulnerability exists in an unknown function of the Calendar component of WebSystems WebTOTUM 2026 that allows malicious input to be reflected and executed as script in the victim’s browser. As an injection flaw, it is classified as CWE‑79 and CWE‑94. The flaw can lead to the execution of arbitrary client‑side code, potentially exposing user credentials, session tokens, or enabling drive‑by attacks if the victim visits a crafted URL or page.

Affected Systems

Only the WebSystems WebTOTUM 2026 product is affected, specifically the Calendar feature. No additional version range is listed, so all installed instances of the 2026 release are considered vulnerable.

Risk and Exploitability

The CVSS score of 5.1 indicates a moderate severity. The EPSS score is not published, and the issue is not listed in CISA KEV, so there is no evidence of mass exploitation yet. However, the exploit has been publicly disclosed and a fixed version has been issued by the vendor, implying that remote attackers could readily use the flaw if the system is not patched. The attack vector is inferred to be remote, as the description states that the attack may be initiated remotely and that the publicly disclosed exploit can be used.

Generated by OpenCVE AI on April 21, 2026 at 22:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the vendor‑released fixed version of WebTOTUM that addresses the Calendar XSS flaw.
  • If an immediate update is not possible, block or disable access to the Calendar feature until the patch can be applied.
  • Apply a strict Content Security Policy that disallows inline scripts and limits script sources to trusted domains to mitigate the impact of any remaining XSS payloads.

Generated by OpenCVE AI on April 21, 2026 at 22:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Websystems
Websystems webtotum
Vendors & Products Websystems
Websystems webtotum

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in WebSystems WebTOTUM 2026. This impacts an unknown function of the component Calendar. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading the affected component is recommended. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Title WebSystems WebTOTUM Calendar cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Websystems Webtotum
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-21T17:59:15.584Z

Reserved: 2026-04-21T11:56:50.965Z

Link: CVE-2026-6743

cve-icon Vulnrichment

Updated: 2026-04-21T17:59:10.332Z

cve-icon NVD

Status : Received

Published: 2026-04-21T17:16:58.157

Modified: 2026-04-21T17:16:58.157

Link: CVE-2026-6743

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T11:46:11Z

Weaknesses