CVE-2026-2679
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to run malicious code in a victim's web browser by exploiting a flaw in the A3factura platform when the victim visits a specific URL with a manipulated customer name. The attacker needs to trick the victim into clicking on a specially crafted link that includes this altered parameter.
Technical Description
Reflected Cross-Site Scripting (XSS) on the A3factura web platform, in parameter 'customerName', in 'a3factura-app.wolterskluwer.es/#/incomes/salesInvoices' endpoint, which could allow an attacker to execute arbitrary code in the victim's browser.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 26, 2026
about 1 month ago
Last Modified
Mar 2, 2026
about 1 month ago
Vendor
wolterskluwer
Product
a3factura
Related Vulnerabilities
This vulnerability allows an attacker to run malicious code in a victim's web browser by tricking them into clicking a specially crafted link that includes a harmful VAT number. It requires the victim to visit a specific page on the A3factura platform, making it a risk primarily for users who interact with that site.
An attacker can exploit a vulnerability in the A3factura web platform to run malicious code in a victim's browser by tricking them into clicking a specially crafted link that includes harmful input in the 'name' parameter. This requires the victim to visit the manipulated link, which could lead to unauthorized actions or data theft.
This vulnerability allows an attacker to run malicious code in a victim's web browser when they visit a specific page on the A3factura platform. To exploit this, the attacker needs to trick the victim into clicking a link that includes a specially crafted parameter.