A reflected cross-site scripting (XSS) vulnerability in the PDF export functionality of the TYDAC AG MAP+ solution allows unauthenticated attackers to craft a malicious URL, that if visited by a victim, will execute arbitrary JavaScript in the victim's context. Such a URL could be delivered through various means, for instance, by sending a link or by tricking victims to visit a page crafted by the attacker.



This issue was verified in MAP+: 3.4.0.

Project Subscriptions

Vendors Products
Tydac Ag Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 18 Feb 2026 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Tydac
Tydac map\+
CPEs cpe:2.3:a:tydac:map\+:3.4.0:*:*:*:*:*:*:*
Vendors & Products Tydac
Tydac map\+
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Mon, 09 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Tydac Ag
Tydac Ag map+
Vendors & Products Tydac Ag
Tydac Ag map+

Fri, 06 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 06:30:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripting (XSS) vulnerability in the PDF export functionality of the TYDAC AG MAP+ solution allows unauthenticated attackers to craft a malicious URL, that if visited by a victim, will execute arbitrary JavaScript in the victim's context. Such a URL could be delivered through various means, for instance, by sending a link or by tricking victims to visit a page crafted by the attacker. This issue was verified in MAP+: 3.4.0.
Title Reflected Cross-Site Scripting in PDF Export Error Message
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-02-06T15:22:50.179Z

Reserved: 2025-12-17T08:22:37.425Z

Link: CVE-2026-0521

cve-icon Vulnrichment

Updated: 2026-02-06T15:22:36.225Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T07:16:11.353

Modified: 2026-02-18T17:43:20.867

Link: CVE-2026-0521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-09T10:52:40Z

Weaknesses