Home

Description

AVE DOMINAplus 1.10.x contains cross-site request forgery and cross-site scripting vulnerabilities that allow attackers to perform administrative actions without user consent. Attackers can craft malicious web pages to exploit login.php parameters and execute arbitrary scripts in user browser sessions.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Cross-Site Request Forgery (CSRF)

Product status

Web Server Code 53AB-WBS - 1.10.62
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5547.php exploit

www.exploit-db.com/exploits/47821 (ExploitDB-47821) exploit

www.ave.it (AVE S.p.A. Official Website) product

www.domoticaplus.it (DOMINAplus Product Page) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5547.php (Zero Science Lab Disclosure (ZSL-2019-5547)) third-party-advisory

cve.org (CVE-2019-25233)

nvd.nist.gov (CVE-2019-25233)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.