Description
A reflected cross-site scripting (XSS) vulnerability in the PDF export functionality of the TYDAC AG MAP+ solution allows unauthenticated attackers to craft a malicious URL, that if visited by a victim, will execute arbitrary JavaScript in the victim's context. Such a URL could be delivered through various means, for instance, by sending a link or by tricking victims to visit a page crafted by the attacker. This issue was verified in MAP+: 3.4.0.
Problem types
CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Product status
Any version before 3.0.0
Credits
Benjamin Faller, Redguard AG
David Wischnjak, Redguard AG
References
www.tydac.ch/en/mapplus/
www.redguard.ch/blog/2026/02/05/advisory-tydac-mapplus/