CVE-2025-10711: Cross Site Scripting in 07FLYCMS
A vulnerability has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This vulnerability affects unknown code of the file /index.php/sysmanage/Login. Such manipulation of the argument Name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10711 is a cross-site scripting (XSS) vulnerability identified in the 07FLYCMS family of products, including 07FLY-CMS and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the /index.php/sysmanage/Login endpoint, specifically involving improper sanitization or validation of the 'Name' argument. An attacker can remotely craft malicious input to this parameter, which is then reflected in the application's response without adequate encoding or filtering, enabling the execution of arbitrary JavaScript code in the context of the victim's browser. This type of vulnerability is classified as a reflected XSS, which typically requires the victim to click on a crafted link or visit a malicious page that triggers the payload. The vendor was notified early but did not respond or provide a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or authentication, but does require user interaction. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability affects multiple product names under the same codebase, indicating a wider potential attack surface. No known exploits are currently observed in the wild, but public disclosure raises the likelihood of future exploitation attempts.
Potential Impact
For European organizations using 07FLYCMS or its variants, this vulnerability poses a moderate risk primarily to web application users and administrators. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim due to the execution of malicious scripts in their browsers. This can undermine user trust, lead to data leakage, and potentially facilitate further attacks such as phishing or malware distribution. While the vulnerability does not directly compromise backend systems or data integrity, the indirect effects on user accounts and organizational reputation can be significant. Organizations in sectors with high web interaction, such as e-commerce, government portals, or customer relationship management, may face increased risks. The lack of vendor response and patch availability exacerbates the threat, requiring organizations to implement compensating controls. Additionally, the public disclosure of exploit details increases the likelihood of opportunistic attacks targeting unpatched systems across Europe.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include input validation and output encoding at the application level to sanitize the 'Name' parameter, ideally through web application firewalls (WAFs) configured to detect and block XSS payloads targeting the vulnerable endpoint. Organizations should also enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. User awareness training to recognize phishing attempts and suspicious links can reduce the risk of successful exploitation. Regular security audits and penetration testing should be conducted to identify and remediate similar vulnerabilities. Where possible, organizations should consider isolating or restricting access to the affected application components, especially if they are externally accessible. Monitoring web server logs for unusual requests to /index.php/sysmanage/Login can help detect exploitation attempts. Finally, organizations should engage with the vendor or consider migrating to alternative CMS/CRM solutions with active security support.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-10711: Cross Site Scripting in 07FLYCMS
Description
A vulnerability has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This vulnerability affects unknown code of the file /index.php/sysmanage/Login. Such manipulation of the argument Name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10711 is a cross-site scripting (XSS) vulnerability identified in the 07FLYCMS family of products, including 07FLY-CMS and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the /index.php/sysmanage/Login endpoint, specifically involving improper sanitization or validation of the 'Name' argument. An attacker can remotely craft malicious input to this parameter, which is then reflected in the application's response without adequate encoding or filtering, enabling the execution of arbitrary JavaScript code in the context of the victim's browser. This type of vulnerability is classified as a reflected XSS, which typically requires the victim to click on a crafted link or visit a malicious page that triggers the payload. The vendor was notified early but did not respond or provide a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or authentication, but does require user interaction. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability affects multiple product names under the same codebase, indicating a wider potential attack surface. No known exploits are currently observed in the wild, but public disclosure raises the likelihood of future exploitation attempts.
Potential Impact
For European organizations using 07FLYCMS or its variants, this vulnerability poses a moderate risk primarily to web application users and administrators. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim due to the execution of malicious scripts in their browsers. This can undermine user trust, lead to data leakage, and potentially facilitate further attacks such as phishing or malware distribution. While the vulnerability does not directly compromise backend systems or data integrity, the indirect effects on user accounts and organizational reputation can be significant. Organizations in sectors with high web interaction, such as e-commerce, government portals, or customer relationship management, may face increased risks. The lack of vendor response and patch availability exacerbates the threat, requiring organizations to implement compensating controls. Additionally, the public disclosure of exploit details increases the likelihood of opportunistic attacks targeting unpatched systems across Europe.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include input validation and output encoding at the application level to sanitize the 'Name' parameter, ideally through web application firewalls (WAFs) configured to detect and block XSS payloads targeting the vulnerable endpoint. Organizations should also enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. User awareness training to recognize phishing attempts and suspicious links can reduce the risk of successful exploitation. Regular security audits and penetration testing should be conducted to identify and remediate similar vulnerabilities. Where possible, organizations should consider isolating or restricting access to the affected application components, especially if they are externally accessible. Monitoring web server logs for unusual requests to /index.php/sysmanage/Login can help detect exploitation attempts. Finally, organizations should engage with the vendor or consider migrating to alternative CMS/CRM solutions with active security support.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-19T06:07:26.582Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cd76f94b8a032c4faa638f
Added to database: 9/19/2025, 3:30:01 PM
Last enriched: 9/19/2025, 3:30:23 PM
Last updated: 9/19/2025, 3:30:23 PM
Views: 1
Related Threats
CVE-2025-10647: CWE-434 Unrestricted Upload of File with Dangerous Type in salzano Embed PDF for WPForms
HighCVE-2025-10630: CWE-20 Improper Input Validation in Grafana grafana-zabbix-plugin
MediumCVE-2025-7702: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Pusula Communication Information Internet Industry and Trade Ltd. Co. Manageable Email Sending System
MediumCVE-2025-5948: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
CriticalCVE-2025-10456: Integer Overflow or Wraparound in zephyrproject-rtos Zephyr
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.