Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 04 Feb 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zucchetti infinity Zmaintenance
|
|
| CPEs | cpe:2.3:a:zucchetti:infinity_zmaintenance:*:*:*:*:*:*:*:* cpe:2.3:a:zucchetti:infinity_zucchetti:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Zucchetti infinity Zmaintenance
|
Wed, 05 Nov 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zucchetti
Zucchetti infinity Zucchetti Zucchetti zmaintenance Infinity |
|
| Vendors & Products |
Zucchetti
Zucchetti infinity Zucchetti Zucchetti zmaintenance Infinity |
Tue, 04 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
cvssV3_1
|
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A reflected cross-site scripted (XSS) vulnerability in the /jsp/gsfr_feditorHTML.jsp endpoint of Zucchetti ZMaintenance Infinity v4.1 allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into the pHtmlSource parameter. | A reflected cross-site scripted (XSS) vulnerability in the /jsp/gsfr_feditorHTML.jsp endpoint of Zucchetti ZMaintenance Infinity and Infinity Zucchetti v4.1 and earlier allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into the pHtmlSource parameter. A vendor fix was released on 2025-06-18. |
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A reflected cross-site scripted (XSS) vulnerability in the /jsp/gsfr_feditorHTML.jsp endpoint of Zucchetti ZMaintenance Infinity v4.1 allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into the pHtmlSource parameter. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-11-04T21:14:00.631Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61431
Updated: 2025-11-04T21:13:42.934Z
Status : Analyzed
Published: 2025-11-04T20:17:27.823
Modified: 2026-02-04T19:49:48.417
Link: CVE-2025-61431
No data.
OpenCVE Enrichment
Updated: 2025-11-05T10:47:16Z