Home

Description

A reflected cross-site scripting (XSS) vulnerability in the PDF export functionality of the TYDAC AG MAP+ solution allows unauthenticated attackers to craft a malicious URL, that if visited by a victim, will execute arbitrary JavaScript in the victim's context. Such a URL could be delivered through various means, for instance, by sending a link or by tricking victims to visit a page crafted by the attacker. This issue was verified in MAP+: 3.4.0.

PUBLISHED Reserved 2025-12-17 | Published 2026-02-06 | Updated 2026-02-06 | Assigner NCSC.ch




MEDIUM: 5.6CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:P

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unknown

Any version before 3.0.0
unaffected

Credits

Benjamin Faller, Redguard AG finder

David Wischnjak, Redguard AG finder

References

www.tydac.ch/en/mapplus/ product

www.redguard.ch/blog/2026/02/05/advisory-tydac-mapplus/ third-party-advisory technical-description

cve.org (CVE-2026-0521)

nvd.nist.gov (CVE-2026-0521)

Download JSON