Skip to main content

CVE-2025-10710: Cross Site Scripting in 07FLYCMS

Medium
VulnerabilityCVE-2025-10710cvecve-2025-10710
Published: Fri Sep 19 2025 (09/19/2025, 12:32:09 UTC)
Source: CVE Database V5
Product: 07FLYCMS

Description

A flaw has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This affects an unknown part of the file /index.php. This manipulation of the argument Name causes cross site scripting. The attack is possible to be carried out remotely. The exploit has been published and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:30:13 UTC

Technical Analysis

CVE-2025-10710 is a cross-site scripting (XSS) vulnerability identified in the 07FLYCMS family of products, including 07FLY-CMS and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the handling of the 'Name' parameter within the /index.php file. Specifically, improper input validation or sanitization allows an attacker to inject malicious scripts that are then executed in the context of the victim's browser. This flaw can be exploited remotely without requiring authentication, making it accessible to unauthenticated attackers over the network. The vulnerability is classified as reflected or stored XSS depending on the exact injection point, though the details specify manipulation of an argument, suggesting reflected XSS. The vendor was notified but did not respond or issue a patch, and an exploit has been published publicly, increasing the risk of exploitation. The CVSS v4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation (no privileges or authentication needed), user interaction required (victim must visit a crafted URL), and limited impact on confidentiality and integrity (no direct data breach or system compromise indicated). However, XSS can be leveraged for session hijacking, phishing, or delivering further malware payloads. The vulnerability affects a CMS and CRM system used for website and customer relationship management, which may contain sensitive business and customer data. The lack of vendor response and patch availability increases the urgency for organizations to implement mitigations.

Potential Impact

For European organizations using 07FLYCMS or its variants, this vulnerability poses a moderate risk. Exploitation could lead to theft of user credentials, session tokens, or other sensitive information through malicious script execution in users' browsers. This can result in unauthorized access to administrative interfaces or customer data, potentially leading to data breaches and reputational damage. Since these CMS/CRM platforms often manage customer interactions and business processes, an attacker could manipulate displayed content or redirect users to phishing sites, impacting trust and compliance with GDPR. The remote and unauthenticated nature of the exploit increases exposure, especially for public-facing web portals. Although the vulnerability itself does not directly compromise server integrity or availability, chained attacks could escalate impact. The absence of a vendor patch means European organizations must rely on compensating controls to reduce risk. The medium severity score reflects a balanced view of exploitability and impact, but the public availability of exploits and lack of vendor response elevate the threat level in operational contexts.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement the following specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the 'Name' parameter in /index.php requests. 2) Conduct thorough input validation and output encoding at the application layer if source code access is available, sanitizing the 'Name' parameter to neutralize script injections. 3) Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers, mitigating the impact of XSS. 4) Educate users and administrators about the risks of clicking suspicious links and encourage the use of multi-factor authentication to reduce session hijacking risks. 5) Monitor web server logs for unusual request patterns targeting the vulnerable parameter to detect exploitation attempts early. 6) Consider isolating or restricting access to the affected CMS/CRM systems, especially if they are internet-facing, until a patch or vendor guidance is available. 7) Engage with the vendor or community to track any forthcoming patches or updates. These targeted actions go beyond generic advice by focusing on the specific vulnerable parameter and the nature of the exploit.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-19T06:07:23.595Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cd76f94b8a032c4faa6389

Added to database: 9/19/2025, 3:30:01 PM

Last enriched: 9/19/2025, 3:30:13 PM

Last updated: 9/19/2025, 4:07:00 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats