CVE-2025-40719

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting (XSS) vulnerability in Quiter Gateway allows attackers to execute malicious JavaScript in victims' browsers by crafting URLs with malicious payloads in the id_concesion parameter. This affects organizations using Quiter Gateway versions before 4.7.0. Attackers can steal session cookies, redirect users, or perform actions on their behalf.

💻 Affected Systems

Products:
  • Quiter Gateway
Versions: Versions prior to 4.7.0
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the /<Client>FacturaE/VerFacturaPDF endpoint via the id_concesion parameter.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover, sensitive data theft, or redirection to malicious sites leading to further compromise.

🟠

Likely Case

Session hijacking, credential theft, or defacement of the application interface.

🟢

If Mitigated

Limited impact if input validation and output encoding are properly implemented, though some risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires tricking a user into clicking a malicious link, making it dependent on social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.7.0

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-quiterweb-autoweb-quiter

Restart Required: Yes

Instructions:

1. Download Quiter Gateway version 4.7.0 or later from the vendor. 2. Backup current installation and data. 3. Apply the update following vendor instructions. 4. Restart the application/service.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side validation to sanitize the id_concesion parameter, allowing only expected characters.

N/A - Requires code changes

Web Application Firewall (WAF) Rule

all

Deploy a WAF rule to block requests containing suspicious patterns in the id_concesion parameter.

N/A - Configure via WAF interface

🧯 If You Can't Patch

  • Implement Content Security Policy (CSP) headers to restrict script execution.
  • Use browser security features like HttpOnly and Secure flags for cookies to limit impact.

🔍 How to Verify

Check if Vulnerable:

Test by accessing the vulnerable endpoint with a payload like /<Client>FacturaE/VerFacturaPDF?id_concesion=<script>alert('XSS')</script> and checking if script executes.

Check Version:

Check application version via admin interface or configuration files as per vendor documentation.

Verify Fix Applied:

After patching, repeat the test with the same payload; script execution should be blocked or sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Log entries showing requests to /<Client>FacturaE/VerFacturaPDF with suspicious id_concesion values containing script tags or JavaScript.

Network Indicators:

  • HTTP requests with URL parameters containing encoded script payloads.

SIEM Query:

source="web_logs" AND uri="/<Client>FacturaE/VerFacturaPDF" AND (param="id_concesion" AND value MATCHES "<script.*>.*</script>" OR "javascript:")

🔗 References

📤 Share & Export