Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10711: Cross Site Scripting in 07FLYCMS

0
Medium
VulnerabilityCVE-2025-10711cvecve-2025-10711
Published: Fri Sep 19 2025 (09/19/2025, 12:32:11 UTC)
Source: CVE Database V5
Product: 07FLYCMS

Description

A vulnerability has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This vulnerability affects unknown code of the file /index.php/sysmanage/Login. Such manipulation of the argument Name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:30:23 UTC

Technical Analysis

CVE-2025-10711 is a cross-site scripting (XSS) vulnerability identified in the 07FLYCMS family of products, including 07FLY-CMS and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the /index.php/sysmanage/Login endpoint, specifically involving improper sanitization or validation of the 'Name' argument. An attacker can remotely craft malicious input to this parameter, which is then reflected in the application's response without adequate encoding or filtering, enabling the execution of arbitrary JavaScript code in the context of the victim's browser. This type of vulnerability is classified as a reflected XSS, which typically requires the victim to click on a crafted link or visit a malicious page that triggers the payload. The vendor was notified early but did not respond or provide a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or authentication, but does require user interaction. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability affects multiple product names under the same codebase, indicating a wider potential attack surface. No known exploits are currently observed in the wild, but public disclosure raises the likelihood of future exploitation attempts.

Potential Impact

For European organizations using 07FLYCMS or its variants, this vulnerability poses a moderate risk primarily to web application users and administrators. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim due to the execution of malicious scripts in their browsers. This can undermine user trust, lead to data leakage, and potentially facilitate further attacks such as phishing or malware distribution. While the vulnerability does not directly compromise backend systems or data integrity, the indirect effects on user accounts and organizational reputation can be significant. Organizations in sectors with high web interaction, such as e-commerce, government portals, or customer relationship management, may face increased risks. The lack of vendor response and patch availability exacerbates the threat, requiring organizations to implement compensating controls. Additionally, the public disclosure of exploit details increases the likelihood of opportunistic attacks targeting unpatched systems across Europe.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include input validation and output encoding at the application level to sanitize the 'Name' parameter, ideally through web application firewalls (WAFs) configured to detect and block XSS payloads targeting the vulnerable endpoint. Organizations should also enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. User awareness training to recognize phishing attempts and suspicious links can reduce the risk of successful exploitation. Regular security audits and penetration testing should be conducted to identify and remediate similar vulnerabilities. Where possible, organizations should consider isolating or restricting access to the affected application components, especially if they are externally accessible. Monitoring web server logs for unusual requests to /index.php/sysmanage/Login can help detect exploitation attempts. Finally, organizations should engage with the vendor or consider migrating to alternative CMS/CRM solutions with active security support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-19T06:07:26.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cd76f94b8a032c4faa638f

Added to database: 9/19/2025, 3:30:01 PM

Last enriched: 9/19/2025, 3:30:23 PM

Last updated: 10/31/2025, 5:50:48 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats