VYPR
Medium severity6.1NVD Advisory· Published Mar 18, 2026· Updated Apr 27, 2026

CVE-2026-30695

CVE-2026-30695

Description

A Cross-Site Scripting (XSS) vulnerability exists in the web-based configuration interface of Zucchetti Axess access control devices, including XA4, X3/X3BIO, X4, X7, and XIO / i-door / i-door+. The vulnerability is caused by improper sanitization of user-supplied input in the dirBrowse parameter of the /file_manager.cgi endpoint.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored XSS vulnerability in Zucchetti Axess devices allows unauthenticated attackers to execute arbitrary JavaScript in admin sessions via the dirBrowse parameter.

Vulnerability

Overview

A cross-site scripting (XSS) vulnerability has been identified in the web-based configuration interface of multiple Zucchetti Axess access control devices, including the XA4, X3/X3BIO, X4, X7, and XIO / i-door / i-door+ models [1]. The flaw arises from improper sanitization of user-supplied input in the dirBrowse parameter of the /file_manager.cgi endpoint [1]. This allows an attacker to inject arbitrary HTML and JavaScript code into the administrative interface.

Exploitation

Details

The vulnerability can be triggered by sending a crafted HTTP GET request to the vulnerable endpoint, such as /file_manager.cgi?dirBrowse=PAYLOAD where PAYLOAD contains a malicious script [1]. An unauthenticated attacker can exploit this remotely over the network with low complexity, though user interaction is required (e.g., an administrator viewing the affected page) [1]. The attacker does not need prior authentication to inject the payload, but the script executes in the security context of the authenticated administrative user [1].

Impact

Successful exploitation could lead to session hijacking, unauthorized configuration changes, credential theft, and privilege escalation within the device management interface [1]. The stored nature of the XSS means the injected script persists and may affect multiple administrative sessions [1].

Mitigation

Zucchetti has not yet released a public patch for all affected firmware versions. Known affected versions include XIO h06 build 5522, i-door+ h06 build 5522, XA4 h06 build 5522, and X3 h02 build 4163 [1]. Administrators are advised to restrict network access to the management interface, apply strict input validation at the network perimeter, and monitor for any vendor updates or workarounds [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.