CVE-2025-69606
Received Received - Intake
XSS Vulnerability in GSVoIP Web Panel 2.0.90

Publication date: 2026-05-01

Last updated on: 2026-05-01

Assigner: MITRE

Description
Cross-Site Scripting (XSS) vulnerability was discovered in the GSVoIP web panel version 2.0.90. The `msg` parameter in the `/painel/gateways.php/error` endpoint does not properly sanitize user-supplied input, allowing attackers to inject arbitrary JavaScript into the HTML response. A remote attacker can exploit this vulnerability by sending a crafted URL to a victim, leading to unauthorized script execution, session hijacking, phishing, or other client-side attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-01
Generated
2026-05-07
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
gsvoip gsvoip 2.0.90
razielx64 gsvoip to 2.0.90 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Scripting (XSS) issue found in the GSVoIP web panel version 2.0.90. It occurs because the 'msg' parameter in the '/painel/gateways.php/error' endpoint does not properly sanitize user input. This allows an attacker to inject malicious JavaScript code into the web page.

An attacker can exploit this by sending a specially crafted URL to a victim, which causes the victim's browser to execute the injected script.


How can this vulnerability impact me? :

Exploitation of this vulnerability can lead to unauthorized script execution in the victim's browser. This can result in session hijacking, where attackers steal user session tokens to impersonate the victim.

It can also facilitate phishing attacks by displaying fake content or redirecting users to malicious sites, potentially compromising sensitive information.

Overall, it compromises the security and trustworthiness of the affected web application.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The Cross-Site Scripting (XSS) vulnerability in GSVoIP web panel can lead to unauthorized script execution, session hijacking, phishing, and sensitive data exfiltration. Such impacts can result in the exposure or compromise of personal and sensitive data.

This exposure and compromise of data can negatively affect compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive information against unauthorized access and breaches.

Failure to mitigate this vulnerability could lead to violations of these regulations due to potential data breaches and unauthorized data access.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the `msg` parameter in the `/painel/gateways.php/error` endpoint for improper input sanitization. You can do this by sending crafted HTTP requests with JavaScript payloads in the `msg` parameter and observing if the payload is reflected and executed in the HTML response.

  • Use curl or similar tools to send a test request: curl -i "http://<target>/painel/gateways.php/error?msg=<script>alert('XSS')</script>"
  • Check the HTTP response for the presence of the injected script tag without proper encoding or sanitization.
  • Use a web proxy or browser developer tools to inspect the response and verify if the JavaScript executes.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include implementing proper output encoding and input validation on the `msg` parameter to prevent injection of arbitrary JavaScript.

  • Sanitize or reject any HTML tags or script sequences in user-supplied input.
  • Enforce a strict Content Security Policy (CSP) to restrict the execution of unauthorized scripts.
  • Use secure templating engines that automatically escape output.

Additionally, avoid clicking on suspicious links that may exploit this vulnerability and inform users about the risk of phishing attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart