<?xml version="1.0" encoding="UTF-8"?>
<VrdaData refvuldefversion="1.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://vrda.jpcert.or.jp" xsi:schemaLocation="http://vrda.jpcert.or.jp/feed/xsd/vrda_data.xsd">
  <VrdaDataProvider>
    <Name>JVN iPedia</Name>
    <URL>http://jvndb.jvn.jp</URL>
  </VrdaDataProvider>
  <VrdaDataSourceType>Advisory</VrdaDataSourceType>
  <Vulinfo revisionno="1" lang="ja" invalidated="false">
    <VulinfoID>JVNDB-2026-003998</VulinfoID>
    <VulinfoData>
      <Title>opensourcepos&#12398;open source point of sale&#12395;&#12362;&#12369;&#12427;&#12463;&#12525;&#12473;&#12469;&#12452;&#12488;&#12473;&#12463;&#12522;&#12503;&#12486;&#12451;&#12531;&#12464;&#12398;&#33030;&#24369;&#24615;</Title>
      <VulinfoDescription>
        <Overview>OpenSourcePOS v3.4.1&#12398;&#12450;&#12452;&#12486;&#12512;&#31649;&#29702;&#12362;&#12424;&#12403;&#36009;&#22770;&#35531;&#27714;&#26360;&#27231;&#33021;&#12395;&#12399;&#12463;&#12525;&#12473;&#12469;&#12452;&#12488;&#12473;&#12463;&#12522;&#12503;&#12486;&#12451;&#12531;&#12464;&#65288;XSS&#65289;&#33030;&#24369;&#24615;&#12364;&#23384;&#22312;&#12375;&#12289;&#25915;&#25731;&#32773;&#12364;&#32048;&#24037;&#12373;&#12428;&#12383;&#12506;&#12452;&#12525;&#12540;&#12489;&#12434;&#27880;&#20837;&#12375;&#12390;&#20219;&#24847;&#12398;&#12454;&#12455;&#12502;&#12473;&#12463;&#12522;&#12503;&#12488;&#12420;HTML&#12434;&#23455;&#34892;&#12391;&#12365;&#12414;&#12377;&#12290;</Overview>
      </VulinfoDescription>
      <Affected>
        <AffectedItem affectedstatus="vulnerable">
          <Lapt>cpe:/a:opensourcepos:open_source_point_of_sale</Lapt>
        </AffectedItem>
      </Affected>
      <FactAnalysis>
      </FactAnalysis>
      <Related>
        <RelatedItem relationtype="self" origin="jvnipedia">
          <URL>https://jvndb.jvn.jp/ja/contents/2026/JVNDB-2026-003998.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>Common Vulnerabilities and Exposures (CVE)</Name>
          <VulinfoID>CVE-2025-70095</VulinfoID>
          <URL>https://www.cve.org/CVERecord?id=CVE-2025-70095</URL>
        </RelatedItem>
        <RelatedItem relationtype="alternate" origin="other">
          <Name>National Vulnerability Database (NVD)</Name>
          <VulinfoID>CVE-2025-70095</VulinfoID>
          <URL>https://nvd.nist.gov/vuln/detail/CVE-2025-70095</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>Code</Name>
          <VulinfoID>cve-research/CVE-2025-70095.md at main  hungnqdz/cve-research  GitHub</VulinfoID>
          <URL>https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70095.md</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>JVNDB</Name>
          <VulinfoID>CWE-79</VulinfoID>
          <Title>&#12463;&#12525;&#12473;&#12469;&#12452;&#12488;&#12473;&#12463;&#12522;&#12503;&#12486;&#12451;&#12531;&#12464;</Title>
          <URL>https://jvndb.jvn.jp/ja/cwe/CWE-79.html</URL>
        </RelatedItem>
        <RelatedItem relationtype="reference" origin="other">
          <Name>&#38306;&#36899;&#25991;&#26360;</Name>
          <VulinfoID>GitHub - opensourcepos/opensourcepos: Open Source Point of Sale is a web based point of sale application written in PHP using CodeIgniter framework. It uses MySQL as the data back end and has a Bootstrap 3 based user interface.</VulinfoID>
          <URL>https://github.com/opensourcepos/opensourcepos</URL>
        </RelatedItem>
      </Related>
      <DateFirstPublished>2026-02-19T15:27:38+09:00</DateFirstPublished>
      <DateLastUpdated>2026-02-19T15:27:38+09:00</DateLastUpdated>
    </VulinfoData>
  </Vulinfo>
</VrdaData>
