Skip to main content

CVE-2025-10271: Cross Site Scripting in erjinzhi 10OA

Medium
VulnerabilityCVE-2025-10271cvecve-2025-10271
Published: Thu Sep 11 2025 (09/11/2025, 21:32:06 UTC)
Source: CVE Database V5
Vendor/Project: erjinzhi
Product: 10OA

Description

A vulnerability was found in erjinzhi 10OA 1.0. This impacts an unknown function of the file /trial/mvc/finder. The manipulation of the argument Name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/11/2025, 21:59:49 UTC

Technical Analysis

CVE-2025-10271 is a cross-site scripting (XSS) vulnerability identified in erjinzhi 10OA version 1.0, specifically within an unspecified function of the /trial/mvc/finder file. The vulnerability arises from improper sanitization or validation of the 'Name' argument, allowing an attacker to inject malicious scripts. This flaw can be exploited remotely without requiring authentication or privileges, and only requires user interaction (e.g., a victim clicking a crafted link or visiting a malicious page). The vulnerability is classified as reflected XSS, which can be leveraged to execute arbitrary JavaScript in the context of the victim's browser session. Potential attack vectors include stealing session cookies, performing actions on behalf of the user, or delivering further malware payloads. Although the vendor was notified early, no response or patch has been issued, and a public exploit is available, increasing the risk of exploitation. The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (network accessible, no privileges needed) but limited impact on confidentiality and availability. The vulnerability does not affect the integrity of the server or data directly but compromises client-side security and user trust. No known exploits in the wild have been reported yet, but the public availability of the exploit code elevates the threat level. The lack of vendor response and patch availability means organizations must rely on mitigation strategies until an official fix is released.

Potential Impact

For European organizations using erjinzhi 10OA 1.0, this vulnerability poses a risk primarily to end users interacting with the affected application. Successful exploitation could lead to session hijacking, unauthorized actions performed in the context of the victim user, or phishing attacks leveraging the trusted application interface. This can result in data leakage, unauthorized access to sensitive information, and potential reputational damage. In sectors with strict data protection regulations such as GDPR, exploitation could lead to compliance violations and financial penalties. The impact is more pronounced in organizations where erjinzhi 10OA is used for critical business processes or where users have elevated privileges. Additionally, the lack of vendor patching increases the window of exposure, making timely mitigation essential. While the vulnerability does not directly compromise backend systems, the client-side impact can cascade into broader security incidents if attackers leverage stolen credentials or session tokens.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'Name' parameter in /trial/mvc/finder requests. 2) Conduct input validation and output encoding on the client side where possible to reduce XSS risks. 3) Educate users about the risks of clicking unknown or suspicious links related to the erjinzhi 10OA application. 4) Monitor web server logs for unusual requests targeting the vulnerable endpoint to detect exploitation attempts early. 5) If feasible, restrict access to the vulnerable application or isolate it within a segmented network zone to limit exposure. 6) Consider deploying Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers accessing the application. 7) Regularly review and update incident response plans to include scenarios involving XSS exploitation. 8) Engage with the vendor or community to track patch releases or alternative fixes. These measures, combined, can reduce the attack surface and mitigate the risk until a vendor patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T15:11:24.215Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c342ce563d4c3db06120d1

Added to database: 9/11/2025, 9:44:46 PM

Last enriched: 9/11/2025, 9:59:49 PM

Last updated: 9/11/2025, 10:58:10 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats