CVE-2025-41026

| EUVD-2025-209047 MEDIUM
2026-03-26 INCIBE
5.1
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
A
Scope
X

Lifecycle Timeline

4
EUVD ID Assigned
Mar 26, 2026 - 12:45 euvd
EUVD-2025-209047
Analysis Generated
Mar 26, 2026 - 12:45 vuln.today
Patch Released
Mar 26, 2026 - 12:45 nvd
Patch available
CVE Published
Mar 26, 2026 - 12:31 nvd
MEDIUM 5.1

Description

Reflected Cross Site Scripting (XSS) vulnerabilities in GDTaller. These vulnerabilities allows an attacker execute JavaScript code in the victim's browser by sending a malicious URL en  'site' parameter in 'app_login.php'.

Analysis

GDTaller is vulnerable to reflected cross-site scripting (XSS) in the app_login.php file, specifically through the 'site' parameter, allowing unauthenticated remote attackers to execute arbitrary JavaScript in victim browsers via malicious URLs. The vulnerability affects GDTaller versions prior to an unspecified patch release and carries a CVSS 5.1 score reflecting low immediate confidentiality impact but limited scope and user interaction requirement. A vendor patch is available from INCIBE, though no public exploit code has been identified at time of analysis.

Technical Context

This vulnerability is a classic reflected XSS flaw (CWE-79) in PHP-based web application input handling. The app_login.php endpoint fails to properly sanitize or encode user-supplied input in the 'site' parameter before reflecting it back to the client in HTTP responses. GDTaller (cpe:2.3:a:gdtaller:gdtaller) is a PHP web application, and the lack of context-appropriate output encoding allows attacker-controlled script payloads to be parsed and executed by the victim's browser within the security context of the vulnerable domain. Reflected XSS differs from stored XSS in that the payload must be delivered in the request itself; the server does not persistently store it.

Affected Products

GDTaller all versions prior to the patched release are affected, as indicated by the CPE cpe:2.3:a:gdtaller:gdtaller:*:*:*:*:*:*:*:* and the EUVD advisory stating 'GDTaller 0 <*'. The vendor advisory from INCIBE (https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gdtaller) contains the authoritative list of vulnerable versions and patch availability details. Additional information is available in the NVD vulnerability entry at https://nvd.nist.gov/vuln/detail/CVE-2025-41026.

Remediation

Upgrade GDTaller to the patched version released by the vendor via INCIBE's security advisory. The patch is confirmed available per vendor notification. Until patching is completed, implement input validation and output encoding mitigations: enforce strict Content Security Policy (CSP) headers to prevent inline script execution, apply HTML entity encoding to all user-supplied input reflected in responses, and consider deploying a Web Application Firewall (WAF) with XSS signature rules to block malicious payloads in the 'site' parameter. Additionally, educate end users to avoid clicking links from untrusted sources, and monitor access logs for suspicious 'site' parameter values containing script tags or JavaScript protocols. Consult https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-gdtaller for exact patched version numbers and deployment instructions.

Priority Score

26
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +26
POC: 0

Share

CVE-2025-41026 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy