Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70845: n/a

0
Medium
VulnerabilityCVE-2025-70845cvecve-2025-70845
Published: Thu Feb 12 2026 (02/12/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

lty628 aidigu v1.9.1 is vulnerable to Cross Site Scripting (XSS) exists in the /setting/ page where the "intro" field is not properly sanitized or escaped.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/20/2026, 09:05:21 UTC

Technical Analysis

CVE-2025-70845 is a Cross Site Scripting (XSS) vulnerability identified in the lty628 aidigu software, version 1.9.1. The vulnerability exists on the /setting/ page within the "intro" input field, which fails to properly sanitize or escape user-supplied input. This improper handling allows attackers to inject malicious JavaScript code that executes in the context of users visiting the page, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. The CVSS 3.1 base score is 6.1, reflecting a medium severity with the vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, meaning it is remotely exploitable over the network without privileges but requires user interaction and affects confidentiality and integrity with a scope change. No patches or fixes have been released yet, and no known exploits have been observed in the wild. The vulnerability's presence in a web application setting means that attackers can craft malicious links or payloads that, when clicked by users, execute scripts in their browsers, potentially compromising sensitive data or altering application behavior. Mitigation requires proper input validation, output encoding, and possibly implementing Content Security Policy (CSP) headers to reduce the risk of script execution.

Potential Impact

The impact of CVE-2025-70845 is primarily on the confidentiality and integrity of user data and application state. Successful exploitation can lead to theft of session cookies, enabling attackers to impersonate users and access sensitive information or perform unauthorized actions. It can also allow attackers to manipulate the content displayed to users, potentially misleading them or injecting malicious content such as phishing forms. Although availability is not directly affected, the compromise of user trust and data confidentiality can have significant reputational and operational consequences for organizations. Since the vulnerability requires user interaction, the attack vector often involves social engineering or phishing campaigns. Organizations relying on lty628 aidigu for critical web applications may face increased risk of data breaches or account compromise if this vulnerability is exploited. The lack of a patch increases exposure time, emphasizing the need for immediate mitigation steps.

Mitigation Recommendations

To mitigate CVE-2025-70845, organizations should implement strict input validation and output encoding on the "intro" field and any other user-controllable inputs within the application. Employing context-aware escaping techniques for HTML, JavaScript, and URL contexts is essential to prevent script injection. Implementing a robust Content Security Policy (CSP) can help restrict the execution of unauthorized scripts. Additionally, security teams should monitor web application logs for suspicious input patterns and potential exploitation attempts. User education to recognize phishing attempts can reduce the risk of successful exploitation requiring user interaction. If possible, isolate or disable the vulnerable /setting/ page until a vendor patch is available. Regularly updating and patching the software once a fix is released is critical. Finally, consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698e4e5cc9e1ff5ad8206a2f

Added to database: 2/12/2026, 10:04:12 PM

Last enriched: 2/20/2026, 9:05:21 AM

Last updated: 3/29/2026, 10:02:29 PM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses