VYPR
Medium severity6.1NVD Advisory· Published Feb 18, 2026· Updated Apr 15, 2026

CVE-2019-25356

CVE-2019-25356

Description

Bematech (formerly Logic Controls, now Elgin) MP-4200 TH printer contains a cross-site scripting vulnerability in the admin configuration page. Attackers can inject malicious scripts via crafted POST requests with malformed 'admin' and 'person' parameters, allowing execution of arbitrary JavaScript in the context of an authenticated user's browser session.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Bematech MP-4200 TH printer admin page is vulnerable to stored XSS via crafted 'admin' or 'person' POST parameters.

The Bematech (formerly Logic Controls, now Elgin) MP-4200 TH printer's administrative configuration page (/en/conf_admin.html) is vulnerable to cross-site scripting (XSS). The vulnerability exists because the admin and person POST parameters are not sanitized before being reflected in the page, allowing an attacker to inject arbitrary HTML or JavaScript.

Exploitation

An attacker can send a crafted POST request to the affected page with malicious JavaScript payloads URL-encoded in the admin or person parameters. The provided exploit from [1] demonstrates injecting `` into these fields. No authentication is required to trigger the reflection; however, the injected script executes in the browser session of any authenticated administrator who views the configuration page.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of an authenticated admin user's browser session. This can lead to session hijacking, defacement, or theft of sensitive printer configuration data. The CVSS v3 score of 6.1 (Medium) reflects the requirement for user interaction (admin viewing the page) and the potential for partial confidentiality and integrity impact.

Mitigation

No official patch from Bematech/Elgin has been identified as of the publication date. Users should consider restricting network access to the printer's web interface, using firewalls or VLAN segmentation, and avoiding access of the admin page until a firmware update is provided. The vendor's website [2] no longer appears to list this product, suggesting it may be end-of-life.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.