CVE-2026-1630 PUBLISHED

Reflected XSS in WEBCON BPS

Assigner: CERT-PL
Reserved: 29.01.2026 Published: 14.05.2026 Updated: 14.05.2026

WEBCON BPS is vulnerable to Reflected XSS via one of parameters used by "/openinmobileapp" endpoint. An attacker can send a specially crafted URL that, when opened by an authenticated user, results in arbitrary JavaScript execution in the victim's browser.

This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
CVSS Score: 5.1

Product Status

Vendor WEBCON
Product WEBCON BPS
Versions Default: unaffected
  • affected from 2026.1.1.45 to 2026.1.3.109 (excl.)
  • affected from 2025.1.1.87 to 2025.2.1.293 (excl.)

Credits

  • Konrad Szczepaniak finder

References

Problem Types

  • CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') CWE

Impacts

  • CAPEC-591 Reflected XSS