Skip to main content

CVE-2025-10711: Cross Site Scripting in 07FLYCMS

Medium
VulnerabilityCVE-2025-10711cvecve-2025-10711
Published: Fri Sep 19 2025 (09/19/2025, 12:32:11 UTC)
Source: CVE Database V5
Product: 07FLYCMS

Description

A vulnerability has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This vulnerability affects unknown code of the file /index.php/sysmanage/Login. Such manipulation of the argument Name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/19/2025, 15:30:23 UTC

Technical Analysis

CVE-2025-10711 is a cross-site scripting (XSS) vulnerability identified in the 07FLYCMS family of products, including 07FLY-CMS and 07FlyCRM, affecting versions up to 20250831. The vulnerability resides in the /index.php/sysmanage/Login endpoint, specifically involving improper sanitization or validation of the 'Name' argument. An attacker can remotely craft malicious input to this parameter, which is then reflected in the application's response without adequate encoding or filtering, enabling the execution of arbitrary JavaScript code in the context of the victim's browser. This type of vulnerability is classified as a reflected XSS, which typically requires the victim to click on a crafted link or visit a malicious page that triggers the payload. The vendor was notified early but did not respond or provide a patch, and the exploit details have been publicly disclosed, increasing the risk of exploitation. The CVSS v4.0 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or authentication, but does require user interaction. The impact on confidentiality is none, integrity is low, and availability is none. The vulnerability affects multiple product names under the same codebase, indicating a wider potential attack surface. No known exploits are currently observed in the wild, but public disclosure raises the likelihood of future exploitation attempts.

Potential Impact

For European organizations using 07FLYCMS or its variants, this vulnerability poses a moderate risk primarily to web application users and administrators. Successful exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim due to the execution of malicious scripts in their browsers. This can undermine user trust, lead to data leakage, and potentially facilitate further attacks such as phishing or malware distribution. While the vulnerability does not directly compromise backend systems or data integrity, the indirect effects on user accounts and organizational reputation can be significant. Organizations in sectors with high web interaction, such as e-commerce, government portals, or customer relationship management, may face increased risks. The lack of vendor response and patch availability exacerbates the threat, requiring organizations to implement compensating controls. Additionally, the public disclosure of exploit details increases the likelihood of opportunistic attacks targeting unpatched systems across Europe.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include input validation and output encoding at the application level to sanitize the 'Name' parameter, ideally through web application firewalls (WAFs) configured to detect and block XSS payloads targeting the vulnerable endpoint. Organizations should also enforce Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. User awareness training to recognize phishing attempts and suspicious links can reduce the risk of successful exploitation. Regular security audits and penetration testing should be conducted to identify and remediate similar vulnerabilities. Where possible, organizations should consider isolating or restricting access to the affected application components, especially if they are externally accessible. Monitoring web server logs for unusual requests to /index.php/sysmanage/Login can help detect exploitation attempts. Finally, organizations should engage with the vendor or consider migrating to alternative CMS/CRM solutions with active security support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-19T06:07:26.582Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68cd76f94b8a032c4faa638f

Added to database: 9/19/2025, 3:30:01 PM

Last enriched: 9/19/2025, 3:30:23 PM

Last updated: 9/19/2025, 3:30:23 PM

Views: 1

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats