VYPR
Medium severity6.1NVD Advisory· Published Mar 30, 2026· Updated Apr 27, 2026

CVE-2026-30082

CVE-2026-30082

Description

Multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature of the Software Package List page of IngEstate Server v11.14.0 allow attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the About application, What's news, or Release note parameters.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

IngEstate Server v11.14.0 Edit feature has stored XSS in three parameters, allowing arbitrary script execution when other users view the Software Package List.

The Software Package List page in IngEstate Server v11.14.0 contains multiple stored cross-site scripting (XSS) vulnerabilities in the Edit feature [2]. The root cause is insufficient sanitization of user input in the 'About application', 'What's news', and 'Release note' parameters when accessed via the API endpoint PUT /emgui/rest/appDatasheet//?full=true [2]. This allows an attacker to inject arbitrary HTML and JavaScript payloads that are persisted on the server.

To exploit this, an authenticated attacker must first navigate to the Software Package List page through the dashboard and use the Edit feature [2]. The injected payload is stored and will automatically execute in the browsers of any other user who subsequently views the compromised Software Package information [2]. No additional user interaction is required beyond viewing the page.

Successful exploitation enables arbitrary JavaScript execution in the context of the victim's session [2]. Potential impacts include session hijacking, theft of credentials, and performing unauthorized actions on behalf of the authenticated victim [2]. The vulnerability affects all users who view the modified Software Package details.

Ingenico has not released a security advisory or patch as of the publication date [1][2]. Users should restrict access to the Software Package List edit functionality and sanitize all inputs in the affected parameters until an official fix is provided.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.