An attacker with access to the web application ZeusWeb of the provider Microcom

(in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html  resulting in a stored XSS.
This issue affects ZeusWeb: 6.1.31.
Advisories

No advisories yet.

Fixes

Solution

The provider has implement the new version 6.2.5 which solves the security problems detected in the previous version. The end user does not need to perform any update actions, as the software is cloud-based and managed by the provider, who has implemented the new version for all users.


Workaround

No workaround given by the vendor.

History

Wed, 11 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
Description An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html  resulting in a stored XSS. This issue affects ZeusWeb: 6.1.31.
Title STORED CROSS-SITE SCRIPTING (XSS) ON MICROCOM'S ZEUSWEB
First Time appeared Microcom
Microcom zeusweb
Weaknesses CWE-79
CPEs cpe:2.3:a:microcom:zeusweb:6.1.31:*:*:*:*:*:*:*
Vendors & Products Microcom
Microcom zeusweb
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: HackRTU

Published:

Updated: 2026-02-11T09:05:07.289Z

Reserved: 2025-11-25T09:45:45.902Z

Link: CVE-2025-13648

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-11T09:15:49.793

Modified: 2026-02-11T09:15:49.793

Link: CVE-2025-13648

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses