CVE-2026-0521

6.1 MEDIUM

📋 TL;DR

A reflected cross-site scripting vulnerability in TYDAC AG MAP+ allows unauthenticated attackers to craft malicious URLs that execute arbitrary JavaScript in victims' browsers when visited. This affects all users accessing the vulnerable PDF export functionality, potentially compromising their sessions and data.

💻 Affected Systems

Products:
  • TYDAC AG MAP+
Versions: 3.4.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires PDF export functionality to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal session cookies, perform actions as authenticated users, redirect to phishing sites, or install malware through drive-by downloads.

🟠

Likely Case

Session hijacking, credential theft, or redirection to malicious sites through crafted phishing links.

🟢

If Mitigated

Limited impact if proper input validation and output encoding are implemented, though some user interaction risk remains.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires user interaction (clicking malicious link) but is trivial to craft once vulnerability details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.tydac.ch/en/mapplus/

Restart Required: No

Instructions:

Check vendor website for security updates. Apply any available patches following vendor instructions.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement proper input validation and output encoding for all user-supplied data in PDF export functionality.

Content Security Policy

all

Implement strict Content Security Policy headers to restrict script execution.

🧯 If You Can't Patch

  • Disable PDF export functionality if not required
  • Implement WAF rules to detect and block XSS payloads in URLs

🔍 How to Verify

Check if Vulnerable:

Test PDF export functionality with XSS payloads in URL parameters. Check if scripts execute in response.

Check Version:

Check MAP+ version in application interface or configuration files.

Verify Fix Applied:

Retest with same payloads after remediation. Scripts should be properly encoded and not execute.

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL parameters containing script tags or JavaScript in PDF export requests
  • Multiple failed PDF generation attempts with suspicious parameters

Network Indicators:

  • HTTP requests to PDF export endpoints with encoded script payloads in query strings

SIEM Query:

source="web_logs" AND (url="*pdf*" OR url="*export*") AND (query="*<script>*" OR query="*javascript:*" OR query="*onerror=*" OR query="*onload=*")

🔗 References

📤 Share & Export