A3factura

4 CVEs product

Monthly

CVE-2026-2680 MEDIUM This Month

A3factura's sales delivery notes endpoint is vulnerable to reflected XSS through the customerVATNumber parameter, enabling attackers to execute arbitrary JavaScript in users' browsers via malicious links. The vulnerability requires user interaction and affects the confidentiality and integrity of victim sessions, with no patch currently available. The attack has low complexity and can impact multiple users if the vulnerable parameter is exploited in phishing or watering hole scenarios.

XSS A3factura
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-2679 MEDIUM This Month

A3factura's sales invoice endpoint is vulnerable to reflected XSS through the customerName parameter, enabling attackers to execute arbitrary JavaScript in users' browsers via a crafted link. This requires user interaction to trigger but affects all A3factura users on the vulnerable platform. No patch is currently available.

XSS A3factura
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-2678 MEDIUM This Month

Reflected XSS in the A3factura customer management interface allows unauthenticated attackers to inject malicious scripts through the name parameter, potentially enabling session hijacking or credential theft when victims click a crafted link. The vulnerability requires user interaction and affects the web application at wolterskluwer.es, with no patch currently available.

XSS A3factura
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-2677 MEDIUM This Month

A3factura's representatives management endpoint contains a reflected XSS vulnerability in the 'name' parameter that enables attackers to inject and execute arbitrary JavaScript in users' browsers through a crafted URL. An attacker can exploit this via social engineering to steal session tokens, manipulate account data, or perform unauthorized actions on behalf of the victim. Currently no patch is available for this medium-severity vulnerability affecting the Wolters Kluwer A3factura platform.

XSS A3factura
NVD
CVSS 3.1
6.1
EPSS
0.0%
CVE-2026-2680
EPSS 0% CVSS 6.1
MEDIUM This Month

A3factura's sales delivery notes endpoint is vulnerable to reflected XSS through the customerVATNumber parameter, enabling attackers to execute arbitrary JavaScript in users' browsers via malicious links. The vulnerability requires user interaction and affects the confidentiality and integrity of victim sessions, with no patch currently available. The attack has low complexity and can impact multiple users if the vulnerable parameter is exploited in phishing or watering hole scenarios.

XSS A3factura
NVD
CVE-2026-2679
EPSS 0% CVSS 6.1
MEDIUM This Month

A3factura's sales invoice endpoint is vulnerable to reflected XSS through the customerName parameter, enabling attackers to execute arbitrary JavaScript in users' browsers via a crafted link. This requires user interaction to trigger but affects all A3factura users on the vulnerable platform. No patch is currently available.

XSS A3factura
NVD
CVE-2026-2678
EPSS 0% CVSS 6.1
MEDIUM This Month

Reflected XSS in the A3factura customer management interface allows unauthenticated attackers to inject malicious scripts through the name parameter, potentially enabling session hijacking or credential theft when victims click a crafted link. The vulnerability requires user interaction and affects the web application at wolterskluwer.es, with no patch currently available.

XSS A3factura
NVD
CVE-2026-2677
EPSS 0% CVSS 6.1
MEDIUM This Month

A3factura's representatives management endpoint contains a reflected XSS vulnerability in the 'name' parameter that enables attackers to inject and execute arbitrary JavaScript in users' browsers through a crafted URL. An attacker can exploit this via social engineering to steal session tokens, manipulate account data, or perform unauthorized actions on behalf of the victim. Currently no patch is available for this medium-severity vulnerability affecting the Wolters Kluwer A3factura platform.

XSS A3factura
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy