| Summary | WEBCON BPS is vulnerable to Reflected XSS via one of parameters used by "/openinmobileapp" endpoint. An attacker can send a specially crafted URL that, when opened by an authenticated user, results in arbitrary JavaScript execution in the victim's browser. This issue was fixed in versions 2026.1.3.109 and 2025.2.1.293. |
|---|---|
| Publication Date | May 14, 2026, 11:16 p.m. |
| Registration Date | May 15, 2026, 4:24 a.m. |
| Last Update | May 15, 2026, 1:07 a.m. |