Beyaz CityPLus Reflective XSS (CVE-2026-5783) Poses High Risk

Beyaz CityPLus Reflective XSS (CVE-2026-5783) Poses High Risk

The National Vulnerability Database (NVD) has documented CVE-2026-5783, a high-severity reflected cross-site scripting (XSS) vulnerability affecting Beyaz Computer Software Design Industry and Trade Ltd. Co.’s CityPLus software. This flaw, rated 7.6 CVSSv3.1, stems from improper input neutralization during web page generation, allowing attackers to inject malicious scripts.

Specifically, the NVD notes that all versions of CityPLus prior to V24.29750.1.0 are vulnerable. A successful exploit could lead to data theft, session hijacking, or defacement, depending on the attacker’s objectives and the victim’s privileges. The attacker’s calculus here is low effort, high reward – leveraging user interaction to execute code within a trusted context.

Defenders should prioritize patching CityPLus instances immediately. This isn’t a complex RCE, but XSS can be a potent vector for further compromise, especially in web applications handling sensitive data. Ensure all web application firewalls (WAFs) have robust XSS protection rules in place, though patching remains the primary defense.

What This Means For You

  • If your organization uses Beyaz CityPLus, you need to check your version immediately. Patch to V24.29750.1.0 or later to mitigate CVE-2026-5783. This isn't a vulnerability to ignore; XSS can quickly escalate into full account compromise or data exfiltration.

Indicators of Compromise

IDTypeIndicator
CVE-2026-5783 XSS Beyaz Computer Software Design Industry and Trade Ltd. Co. CityPLus
CVE-2026-5783 XSS CityPLus versions before V24.29750.1.0
CVE-2026-5783 XSS Improper neutralization of input during web page generation
🔎
Track critical vulnerabilities Use /brief to get an analyst-ready weekly threat summary with severity rankings and key IOCs.
Open Intel Bot →
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 20, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-20240 — Denial of Service

CVE-2026-20240 — In Splunk Enterprise versions below 10.2.2, 10.0.5, 9.4.11, and 9.3.12, and Splunk Cloud Platform versions below 10.4.2603.1, 10.3.2512.9, 10.2.2510.11, 10.1.2507.21, 10.0.2503.13, and 9.3.2411.129,...

vulnerabilityCVEmedium-severitydenial-of-servicecwe-20
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma

Splunk Enterprise, Cloud Vulnerability Exposes Session Cookies, Sensitive Data

CVE-2026-20239 — In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a...

vulnerabilityCVEhigh-severitycwe-532
/SCW Vulnerability Desk /HIGH /7.5 /⚑ 5 IOCs /⚙ 4 Sigma

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged

CVE-2026-20238 — In Splunk AI Toolkit versions below 5.7.3, a low-privileged user that does not hold the 'admin' or 'power' roles could access confidential data...

vulnerabilityCVEmedium-severitycwe-863
/SCW Vulnerability Desk /MEDIUM /6.5 /⚑ 2 IOCs /⚙ 2 Sigma