Beyaz CityPLus Reflective XSS (CVE-2026-5783) Poses High Risk
The National Vulnerability Database (NVD) has documented CVE-2026-5783, a high-severity reflected cross-site scripting (XSS) vulnerability affecting Beyaz Computer Software Design Industry and Trade Ltd. Co.’s CityPLus software. This flaw, rated 7.6 CVSSv3.1, stems from improper input neutralization during web page generation, allowing attackers to inject malicious scripts.
Specifically, the NVD notes that all versions of CityPLus prior to V24.29750.1.0 are vulnerable. A successful exploit could lead to data theft, session hijacking, or defacement, depending on the attacker’s objectives and the victim’s privileges. The attacker’s calculus here is low effort, high reward – leveraging user interaction to execute code within a trusted context.
Defenders should prioritize patching CityPLus instances immediately. This isn’t a complex RCE, but XSS can be a potent vector for further compromise, especially in web applications handling sensitive data. Ensure all web application firewalls (WAFs) have robust XSS protection rules in place, though patching remains the primary defense.
What This Means For You
- If your organization uses Beyaz CityPLus, you need to check your version immediately. Patch to V24.29750.1.0 or later to mitigate CVE-2026-5783. This isn't a vulnerability to ignore; XSS can quickly escalate into full account compromise or data exfiltration.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-5783 | XSS | Beyaz Computer Software Design Industry and Trade Ltd. Co. CityPLus |
| CVE-2026-5783 | XSS | CityPLus versions before V24.29750.1.0 |
| CVE-2026-5783 | XSS | Improper neutralization of input during web page generation |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 20, 2026 at 19:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.