CVE-2025-12699

The ZOLL ePCR IOS application reflects unsanitized user input into a WebView. Attacker-controlled strings placed into PCR fields (run number, incident, call sign, notes) are interpreted as HTML/JS when the app prints or renders that content. In the proof of concept (POC), injected scripts return local file content, which would allow arbitrary local file reads from the app's runtime context. These local files contain device and user data within the ePCR medical application, and if exposed, would allow an attacker to access protected health information (PHI) or device telemetry.
Configurations

No configuration.

History

10 Feb 2026, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-10 21:15

Updated : 2026-02-10 21:51


NVD link : CVE-2025-12699

Mitre link : CVE-2025-12699

CVE.ORG link : CVE-2025-12699


JSON object : View

Products Affected

No product.

CWE
CWE-538

Insertion of Sensitive Information into Externally-Accessible File or Directory