A reflected cross-site scripted (XSS) vulnerability in the /jsp/gsfr_feditorHTML.jsp endpoint of Zucchetti ZMaintenance Infinity and Infinity Zucchetti v4.1 and earlier allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into the pHtmlSource parameter. A vendor fix was released on 2025-06-18.
References
| Link | Resource |
|---|---|
| https://gist.github.com/alex-xor/8651dbdd413e4fa7240b0ab1b1845d76 | Third Party Advisory |
| https://www.zucchetti.it/ | Product |
Configurations
Configuration 1 (hide)
|
History
04 Feb 2026, 19:49
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/alex-xor/8651dbdd413e4fa7240b0ab1b1845d76 - Third Party Advisory | |
| References | () https://www.zucchetti.it/ - Product | |
| CPE | cpe:2.3:a:zucchetti:infinity_zmaintenance:*:*:*:*:*:*:*:* cpe:2.3:a:zucchetti:infinity_zucchetti:*:*:*:*:*:*:*:* |
|
| First Time |
Zucchetti infinity Zucchetti
Zucchetti infinity Zmaintenance Zucchetti |
04 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
| CWE | CWE-79 |
04 Nov 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) A reflected cross-site scripted (XSS) vulnerability in the /jsp/gsfr_feditorHTML.jsp endpoint of Zucchetti ZMaintenance Infinity and Infinity Zucchetti v4.1 and earlier allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into the pHtmlSource parameter. A vendor fix was released on 2025-06-18. |
04 Nov 2025, 20:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-04 20:17
Updated : 2026-02-04 19:49
NVD link : CVE-2025-61431
Mitre link : CVE-2025-61431
CVE.ORG link : CVE-2025-61431
JSON object : View
Products Affected
zucchetti
- infinity_zmaintenance
- infinity_zucchetti
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
