HTML injection vulnerability in PHP Point of Sale v19.4. This vulnerability allows an attacker to render HTML in the victim's browser due to a lack of proper validation of user input by sending a request to '/reports/generate/specific_customer', ussing 'start_date_formatted' y 'end_date_formatted' parameters.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
There is no solution reported at this time.
Workaround
No workaround given by the vendor.
References
History
Tue, 21 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HTML injection vulnerability in PHP Point of Sale v19.4. This vulnerability allows an attacker to render HTML in the victim's browser due to a lack of proper validation of user input by sending a request to '/reports/generate/specific_customer', ussing 'start_date_formatted' y 'end_date_formatted' parameters. | |
| Title | HTML injection in PHP Point Of Sale | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-21T16:21:50.544Z
Reserved: 2025-04-16T09:08:43.217Z
Link: CVE-2025-41011
No data.
Status : Awaiting Analysis
Published: 2026-04-21T16:16:19.143
Modified: 2026-04-21T16:20:24.180
Link: CVE-2025-41011
No data.
OpenCVE Enrichment
No data.
Weaknesses