<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Beyaz Computer Software Design Industry and Trade Ltd. Co. — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/beyaz-computer-software-design-industry-and-trade-ltd.-co./</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 16:17:20 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/beyaz-computer-software-design-industry-and-trade-ltd.-co./feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-5783: CityPLus Reflected XSS Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cityplus-xss/</link><pubDate>Wed, 20 May 2026 16:17:20 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cityplus-xss/</guid><description>CVE-2026-5783 is a reflected cross-site scripting (XSS) vulnerability in Beyaz Computer Software Design Industry and Trade Ltd. Co. CityPLus before version V24.29750.1.0, allowing attackers to inject malicious scripts into web pages viewed by users.</description><content:encoded><![CDATA[<p>Beyaz Computer Software Design Industry and Trade Ltd. Co.&rsquo;s CityPLus software is vulnerable to a reflected cross-site scripting (XSS) vulnerability, identified as CVE-2026-5783. This vulnerability affects CityPLus versions prior to V24.29750.1.0. A remote attacker can exploit this vulnerability by injecting arbitrary web scripts into a CityPLus web page. When a user visits the crafted URL, the injected script executes in the user&rsquo;s browser within the context of the CityPLus website. This can lead to information disclosure, session hijacking, or defacement of the website. Defenders should ensure CityPLus is updated to the latest version to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious URL containing a JavaScript payload designed to execute in the context of CityPLus. This payload is often URL-encoded.</li>
<li>The attacker distributes the crafted URL to potential victims, often through phishing emails, social media, or other methods.</li>
<li>A victim clicks on the malicious URL, which directs their web browser to a vulnerable CityPLus endpoint.</li>
<li>The CityPLus application fails to properly sanitize the input provided in the URL, reflecting the malicious JavaScript payload in the server&rsquo;s response.</li>
<li>The victim&rsquo;s web browser receives the HTML response from the server, which includes the unsanitized JavaScript payload.</li>
<li>The victim&rsquo;s browser executes the malicious JavaScript code, believing it to be a legitimate part of the CityPLus website.</li>
<li>The attacker&rsquo;s JavaScript code can perform actions such as stealing cookies, redirecting the user to a malicious website, or modifying the content of the CityPLus page.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the reflected XSS vulnerability (CVE-2026-5783) in CityPLus could allow an attacker to execute arbitrary JavaScript code in the victim&rsquo;s browser. This could result in session hijacking, where the attacker gains control of the user&rsquo;s CityPLus session. The attacker could also redirect the user to a malicious website, steal sensitive information, or deface the CityPLus website. The severity of the impact depends on the privileges of the compromised user and the sensitive information accessible through the CityPLus application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CityPLus to version V24.29750.1.0 or later to patch CVE-2026-5783.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-5783 Exploitation — Suspicious URI Query Parameters&rdquo; to identify potential exploitation attempts.</li>
<li>Educate users about the risks of clicking on suspicious links in emails or on social media to prevent initial access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>xss</category><category>reflected-xss</category><category>web-application</category></item></channel></rss>