VYPR
Medium severity4.6NVD Advisory· Published Jun 25, 2025· Updated Apr 15, 2026

CVE-2025-44206

CVE-2025-44206

Description

Hexagon HxGN OnCall Dispatch Advantage (Web) v10.2309.03.00264 and Hexagon HxGN OnCall Dispatch Advantage (Mobile) v10.2402 are vulnerable to Cross Site Scripting (XSS) which allows a remote authenticated attacker with access to the Broadcast (Person) functionality to execute arbitrary code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS in Hexagon HxGN OnCall Dispatch Advantage lets authenticated attackers execute arbitrary JavaScript on recipients' browsers via the Broadcast functionality.

A stored DOM cross-site scripting (XSS) vulnerability has been discovered in Hexagon HxGN OnCall Dispatch Advantage (Web) v10.2309.03.00264 and HxGN OnCall Dispatch Advantage (Mobile) v10.2402 [1]. The root cause is a lack of proper output encoding when the application processes requests to the /oncall.webapi/api/Commands//CAD_BCAST_REQ and /oncall.webapi/api/Commands//INFORMER_QUERY_PERSON_REQ API endpoints. Specifically, the firstName and lastName parameters are not sanitized or encoded before being used in JavaScript that dynamically generates notifications on recipients' browsers.

The attack requires the attacker to be an authenticated user with access to the Broadcast (Person) functionality [1]. By injecting a malicious JavaScript payload into the firstName or lastName fields of a broadcast request, the attacker can cause the payload to be stored and later reflected without encoding when recipients retrieve broadcasts via the /oncall.webapi/api/Commands//CAD_RETR_BCASTS_REQ endpoint. The notification JavaScript on the recipients' browsers processes this response, leading to stored DOM-based XSS [1].

Successful exploitation allows a remote authenticated attacker to execute arbitrary JavaScript code in the context of the web browser of any broadcast recipient [1]. This can lead to further actions such as session hijacking, data exfiltration, or unauthorized actions performed on behalf of the victim, depending on the application's permissions and the user's privileges.

As of the publication date, users should apply any patches or mitigations recommended by Hexagon AB [1]. The vulnerability was reported by Yu Xuan Soh and Huan Jun Chan in September 2024, and advisory details have been made publicly available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.