Skip to main content

CVE-2025-10944: Cross Site Scripting in yi-ge get-header-ip

Medium
VulnerabilityCVE-2025-10944cvecve-2025-10944
Published: Thu Sep 25 2025 (09/25/2025, 12:32:06 UTC)
Source: CVE Database V5
Vendor/Project: yi-ge
Product: get-header-ip

Description

A weakness has been identified in yi-ge get-header-ip up to 589b23d0eb0043c310a6a13ce4bbe2505d0d0b15. This issue affects the function ip of the file ip.php. This manipulation of the argument callback causes cross site scripting. The attack may be initiated remotely. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/25/2025, 13:22:12 UTC

Technical Analysis

CVE-2025-10944 is a cross-site scripting (XSS) vulnerability identified in the 'get-header-ip' component of the 'yi-ge' project, specifically affecting the function 'ip' within the file ip.php. The vulnerability arises due to improper handling and sanitization of the 'callback' argument, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to craft a specially designed request that, when processed by the vulnerable function, results in the execution of arbitrary JavaScript code in the context of the victim's browser. The attack can be initiated remotely without requiring authentication, although user interaction is necessary for the malicious script to execute (e.g., by visiting a crafted URL). The product follows a rolling release model, which complicates pinpointing exact affected versions beyond the commit hash 589b23d0eb0043c310a6a13ce4bbe2505d0d0b15. The vendor has not responded to early disclosure attempts, and no patches or updates have been publicly released at the time of this report. The CVSS 4.0 base score is 5.1, reflecting a medium severity level, with attack vector as network, low attack complexity, no privileges required, but user interaction needed. The vulnerability impacts confidentiality and integrity to a limited extent by enabling script injection, which could be leveraged for session hijacking, phishing, or other client-side attacks. There are no known exploits in the wild currently, but the lack of vendor response and patch availability increases risk over time.

Potential Impact

For European organizations, the presence of this XSS vulnerability in 'yi-ge get-header-ip' could lead to client-side attacks such as session hijacking, credential theft, or distribution of malware through malicious scripts. If this component is integrated into web applications or services used by European entities, attackers could exploit it to compromise user trust and data confidentiality. The impact is particularly significant for organizations handling sensitive user data or providing critical online services, as successful exploitation could facilitate further attacks or data breaches. Additionally, regulatory frameworks like GDPR impose strict requirements on data protection; exploitation of this vulnerability could result in compliance violations and associated penalties. The medium severity rating suggests that while the vulnerability is not trivially exploitable without user interaction, the potential for harm remains notable, especially in environments with high user traffic or where the vulnerable component is exposed to untrusted inputs.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement immediate compensating controls. These include rigorous input validation and output encoding on the 'callback' parameter to neutralize malicious scripts before processing. Web application firewalls (WAFs) can be configured to detect and block suspicious payloads targeting this parameter. Organizations should audit their use of the 'yi-ge get-header-ip' component to identify affected systems and consider isolating or disabling the vulnerable functionality until a fix is available. Employing Content Security Policy (CSP) headers can mitigate the impact of XSS by restricting script execution sources. Monitoring web logs for anomalous requests targeting the 'callback' argument can help detect attempted exploitation. Finally, organizations should maintain close communication with the vendor or community for updates and apply patches promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T05:54:41.484Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d541e7880f8ca3dd887c96

Added to database: 9/25/2025, 1:21:43 PM

Last enriched: 9/25/2025, 1:22:12 PM

Last updated: 9/25/2025, 7:00:46 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats