CVE-2026-6624
Cross-Site Scripting in BichitroGan ISP Pool List Interface
Publication date: 2026-04-20
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| bichitrogan | isp_billing_software | 2025.3.20 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a weakness found in the BichitroGan ISP Billing Software version 2025.3.20, specifically in an unknown function within the file /?_route=pool/add of the Pool List Interface component.
The issue allows an attacker to perform cross-site scripting (XSS) attacks by manipulating this function. Such an attack can be executed remotely.
The exploit for this vulnerability has been made publicly available, increasing the risk of attacks.
The vendor was informed early about this vulnerability but did not respond.
How can this vulnerability impact me? :
This vulnerability can allow attackers to perform cross-site scripting (XSS) attacks remotely against the affected software.
Such attacks can lead to the execution of malicious scripts in the context of the victim's browser, potentially resulting in session hijacking, defacement, or redirection to malicious sites.
Because the exploit is publicly available, the risk of exploitation is higher.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability is a Stored Cross-Site Scripting (XSS) issue that allows execution of arbitrary JavaScript code, potentially leading to session hijacking, administrative account compromise, unauthorized actions, and full system takeover.
Such security weaknesses can impact compliance with common standards and regulations like GDPR and HIPAA because they may lead to unauthorized access to sensitive personal or health data, violate data protection principles, and fail to ensure adequate security controls.
Specifically, failure to properly validate and sanitize input, and to protect against XSS attacks, can result in breaches of confidentiality and integrity, which are critical requirements under these regulations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to inject a simple JavaScript payload into the Pool Name field on the pool addition page and then checking if the payload executes when viewing the pool list.
- Use a web browser or a tool like curl or wget to send a POST request with a payload such as `<script>alert(1)</script>` to the URL `https://your-bichitrogan-instance/?_route=pool/add` in the Pool Name field.
- After submitting, visit the pool list page at `https://your-bichitrogan-instance/?_route=pool/list` and observe if the alert box or injected script executes.
- Example curl command to test injection (replace URL and parameters accordingly): curl -X POST -d "pool_name=<script>alert(1)</script>" https://your-bichitrogan-instance/?_route=pool/add
If the script executes when viewing the pool list, the vulnerability is present.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include sanitizing and validating all input to the Pool Name field to prevent injection of malicious scripts.
- Implement strict input validation to allow only safe characters in the Pool Name field.
- Escape output when rendering the Pool Name in the Pool List interface using functions like `htmlspecialchars($input, ENT_QUOTES, 'UTF-8')`.
- Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts.
Since the vendor has not responded, applying these mitigations in your environment or custom patches is critical to reduce risk.