WEBCON BPS is vulnerable to Reflected XSS via one of parameters used by "/openinmobileapp" endpoint. An attacker can send a specially crafted URL that, when opened by an authenticated user, results in arbitrary JavaScript execution in the victim's browser.
This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293.
This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 14 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WEBCON BPS is vulnerable to Reflected XSS via one of parameters used by "/openinmobileapp" endpoint. An attacker can send a specially crafted URL that, when opened by an authenticated user, results in arbitrary JavaScript execution in the victim's browser. This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293. | |
| Title | Reflected XSS in WEBCON BPS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2026-05-14T13:24:14.616Z
Reserved: 2026-01-29T15:28:27.272Z
Link: CVE-2026-1630
No data.
Status : Received
Published: 2026-05-14T14:16:16.537
Modified: 2026-05-14T14:16:16.537
Link: CVE-2026-1630
No data.
OpenCVE Enrichment
Updated: 2026-05-14T15:15:23Z
Weaknesses