CVE-2025-59904
Stored XSS in Kubysoft /kForms/app Enables Persistent Script Injection
Publication date: 2026-02-16
Last updated on: 2026-03-09
Assigner: Spanish National Cybersecurity Institute, S.A. (INCIBE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kubysoft | kubysoft | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability has been fixed by the Kubysoft development team in the latest software version.
To mitigate this vulnerability, you should update your Kubysoft ERP software to the latest version where the issue is resolved.
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2025-59904 is a Stored Cross-Site Scripting (XSS) vulnerability found in Kubysoft, a cloud-based ERP software platform.'}, {'type': 'paragraph', 'content': "The vulnerability occurs through multiple parameters in the '/kForms/app' endpoint, allowing attackers to inject malicious scripts."}, {'type': 'paragraph', 'content': 'These malicious scripts are executed persistently in the context of users who access the affected resource, potentially compromising their interactions.'}] [1]
How can this vulnerability impact me? :
This vulnerability allows attackers to inject and execute malicious scripts in the context of users accessing the affected Kubysoft resource.
As a result, users may be exposed to risks such as session hijacking, theft of sensitive information, or unauthorized actions performed on their behalf.
Since the scripts execute persistently, the impact can continue until the vulnerability is fixed or mitigated.