CVE-2026-6624
Received Received - Intake
Cross-Site Scripting in BichitroGan ISP Pool List Interface

Publication date: 2026-04-20

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in BichitroGan ISP Billing Software 2025.3.20. Affected is an unknown function of the file /?\_route=pool/add of the component Pool List Interface. Executing a manipulation can lead to cross site scripting. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bichitrogan isp_billing_software 2025.3.20
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a weakness found in the BichitroGan ISP Billing Software version 2025.3.20, specifically in an unknown function within the file /?_route=pool/add of the Pool List Interface component.

The issue allows an attacker to perform cross-site scripting (XSS) attacks by manipulating this function. Such an attack can be executed remotely.

The exploit for this vulnerability has been made publicly available, increasing the risk of attacks.

The vendor was informed early about this vulnerability but did not respond.


How can this vulnerability impact me? :

This vulnerability can allow attackers to perform cross-site scripting (XSS) attacks remotely against the affected software.

Such attacks can lead to the execution of malicious scripts in the context of the victim's browser, potentially resulting in session hijacking, defacement, or redirection to malicious sites.

Because the exploit is publicly available, the risk of exploitation is higher.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability is a Stored Cross-Site Scripting (XSS) issue that allows execution of arbitrary JavaScript code, potentially leading to session hijacking, administrative account compromise, unauthorized actions, and full system takeover.

Such security weaknesses can impact compliance with common standards and regulations like GDPR and HIPAA because they may lead to unauthorized access to sensitive personal or health data, violate data protection principles, and fail to ensure adequate security controls.

Specifically, failure to properly validate and sanitize input, and to protect against XSS attacks, can result in breaches of confidentiality and integrity, which are critical requirements under these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to inject a simple JavaScript payload into the Pool Name field on the pool addition page and then checking if the payload executes when viewing the pool list.

  • Use a web browser or a tool like curl or wget to send a POST request with a payload such as `<script>alert(1)</script>` to the URL `https://your-bichitrogan-instance/?_route=pool/add` in the Pool Name field.
  • After submitting, visit the pool list page at `https://your-bichitrogan-instance/?_route=pool/list` and observe if the alert box or injected script executes.
  • Example curl command to test injection (replace URL and parameters accordingly): curl -X POST -d "pool_name=<script>alert(1)</script>" https://your-bichitrogan-instance/?_route=pool/add

If the script executes when viewing the pool list, the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include sanitizing and validating all input to the Pool Name field to prevent injection of malicious scripts.

  • Implement strict input validation to allow only safe characters in the Pool Name field.
  • Escape output when rendering the Pool Name in the Pool List interface using functions like `htmlspecialchars($input, ENT_QUOTES, 'UTF-8')`.
  • Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts.

Since the vendor has not responded, applying these mitigations in your environment or custom patches is critical to reduce risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart