Skip to main content

CVE-2025-10272: Cross Site Scripting in erjinzhi 10OA

Medium
VulnerabilityCVE-2025-10272cvecve-2025-10272
Published: Thu Sep 11 2025 (09/11/2025, 23:02:06 UTC)
Source: CVE Database V5
Vendor/Project: erjinzhi
Product: 10OA

Description

A vulnerability was determined in erjinzhi 10OA 1.0. Affected is an unknown function of the file /trial/mvc/catalogue. This manipulation of the argument Name causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/11/2025, 23:29:41 UTC

Technical Analysis

CVE-2025-10272 is a cross-site scripting (XSS) vulnerability identified in erjinzhi 10OA version 1.0, specifically within an unspecified function located in the /trial/mvc/catalogue file. The vulnerability arises from improper sanitization or validation of the 'Name' argument, allowing an attacker to inject malicious scripts. This flaw can be exploited remotely without requiring authentication or elevated privileges, and only requires user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user authentication needed (AT:N). However, user interaction (UI:P) is necessary to execute the attack, such as a victim clicking a crafted link or visiting a malicious webpage. The impact primarily affects the confidentiality and integrity of the victim's session or data, with limited impact on availability. The vendor was notified early but has not responded or provided a patch, and while the exploit has been publicly disclosed, there are no known exploits actively observed in the wild at this time. This vulnerability could be leveraged to steal session cookies, perform actions on behalf of authenticated users, or deliver further malware through script injection, posing a risk to users of erjinzhi 10OA 1.0 installations.

Potential Impact

For European organizations using erjinzhi 10OA 1.0, this vulnerability could lead to unauthorized access to user sessions, data theft, or manipulation of application content via injected scripts. The XSS flaw can facilitate phishing attacks, credential theft, or unauthorized actions within the affected web application. Organizations handling sensitive or personal data are particularly at risk of confidentiality breaches. Additionally, compromised user sessions could lead to further lateral movement or privilege escalation within internal networks. Since the vulnerability requires user interaction, social engineering or targeted spear-phishing campaigns could be used to exploit this flaw. The lack of vendor response and patch availability increases the risk exposure duration. European entities in sectors such as government, finance, healthcare, or critical infrastructure that rely on erjinzhi 10OA for internal operations or customer-facing portals may face reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions if exploited.

Mitigation Recommendations

1. Immediate mitigation should include implementing web application firewall (WAF) rules to detect and block malicious payloads targeting the 'Name' parameter in the /trial/mvc/catalogue endpoint. 2. Employ input validation and output encoding on all user-supplied data, especially the 'Name' argument, to neutralize script injection attempts. 3. Conduct user awareness training to reduce the risk of users clicking on suspicious links or engaging with untrusted content. 4. Monitor application logs and network traffic for unusual patterns indicative of XSS exploitation attempts. 5. If possible, isolate or restrict access to the vulnerable erjinzhi 10OA 1.0 instances until a vendor patch or official fix is released. 6. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 7. Engage with the vendor or community to encourage timely patch development and share threat intelligence. 8. Review and update incident response plans to include scenarios involving XSS exploitation and data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-11T15:11:27.123Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c357e6563d4c3db061ed6b

Added to database: 9/11/2025, 11:14:46 PM

Last enriched: 9/11/2025, 11:29:41 PM

Last updated: 9/12/2025, 12:04:01 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats