WEBCON BPS is vulnerable to Reflected XSS via one of parameters used by "/openinmobileapp" endpoint. An attacker can send a specially crafted URL that, when opened by an authenticated user, results in arbitrary JavaScript execution in the victim's browser.
This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293.
Metrics
Affected Vendors & Products
References
History
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WEBCON BPS is vulnerable to Reflected XSS via one of parameters used by "/openinmobileapp" endpoint. An attacker can send a specially crafted URL that, when opened by an authenticated user, results in arbitrary JavaScript execution in the victim's browser. This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293. | |
| Title | Reflected XSS in WEBCON BPS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-PL
Published: 2026-05-14T13:24:14.616Z
Updated: 2026-05-14T15:19:00.384Z
Reserved: 2026-01-29T15:28:27.272Z
Link: CVE-2026-1630
Updated: 2026-05-14T15:18:11.519Z
Status : Deferred
Published: 2026-05-14T14:16:16.537
Modified: 2026-05-14T16:07:11.137
Link: CVE-2026-1630
No data.