Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10945: Cross Site Scripting in nuz007 smsboom

0
Medium
VulnerabilityCVE-2025-10945cvecve-2025-10945
Published: Thu Sep 25 2025 (09/25/2025, 12:32:08 UTC)
Source: CVE Database V5
Vendor/Project: nuz007
Product: smsboom

Description

A security vulnerability has been detected in nuz007 smsboom up to 01b2f35bbbc23f3e0f60f38ca0e3d1b286f8d674. Impacted is an unknown function of the file d.php. Such manipulation of the argument hm leads to cross site scripting. The attack may be launched remotely. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases.

AI-Powered Analysis

AILast updated: 09/25/2025, 13:21:57 UTC

Technical Analysis

CVE-2025-10945 is a cross-site scripting (XSS) vulnerability identified in the nuz007 smsboom product, specifically affecting an unknown function within the d.php file. The vulnerability arises from improper sanitization or validation of the 'hm' argument, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser when they access a crafted URL or interact with the vulnerable component. The attack can be launched remotely without requiring authentication, although user interaction is necessary to trigger the malicious payload (e.g., clicking a link). The product operates on a rolling release basis, which means there are no fixed version numbers for affected or patched releases, complicating precise version tracking. The CVSS v4.0 score is 5.1, indicating a medium severity level, with the vector highlighting network attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability impacts confidentiality and integrity to a limited extent by enabling script execution that could steal session tokens, perform actions on behalf of the user, or deface web content. Availability impact is negligible. There are no known exploits in the wild, and no patches or mitigations have been explicitly linked yet. The lack of detailed versioning and patch information suggests that users of smsboom should be vigilant and seek updates or apply custom input validation controls to mitigate risk.

Potential Impact

For European organizations using nuz007 smsboom, this XSS vulnerability could lead to targeted phishing attacks, session hijacking, or unauthorized actions performed in the context of authenticated users. Given that smsboom is likely a messaging or SMS-related platform, exploitation could compromise communication confidentiality and integrity, potentially exposing sensitive customer or operational data. The medium severity indicates that while the vulnerability is not critical, it still poses a tangible risk, especially in sectors where messaging platforms are integral to business processes, such as telecommunications, customer service, or emergency response. The requirement for user interaction means social engineering could be leveraged to maximize impact. Additionally, the rolling release nature of the product may delay patch deployment, increasing exposure time. European organizations must consider the regulatory implications under GDPR if personal data is compromised through such attacks.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the 'hm' parameter within d.php to neutralize malicious scripts. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Educate users about the risks of clicking on suspicious links, especially those related to smsboom interfaces. 4. Monitor web application logs for unusual parameter values or repeated attempts to exploit the 'hm' argument. 5. Engage with the vendor or community to obtain timely updates or patches given the rolling release model. 6. Consider deploying web application firewalls (WAFs) with custom rules to detect and block XSS payloads targeting smsboom. 7. Conduct regular security assessments and penetration testing focusing on web input vectors in smsboom deployments. 8. If feasible, isolate smsboom instances from critical internal networks to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-25T05:56:58.562Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68d541e7880f8ca3dd887c9c

Added to database: 9/25/2025, 1:21:43 PM

Last enriched: 9/25/2025, 1:21:57 PM

Last updated: 11/6/2025, 3:47:24 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats