Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2965: Cross Site Scripting in 07FLYCMS

0
Medium
VulnerabilityCVE-2026-2965cvecve-2026-2965
Published: Mon Feb 23 2026 (02/23/2026, 01:32:08 UTC)
Source: CVE Database V5
Product: 07FLYCMS

Description

CVE-2026-2965 is a medium severity cross-site scripting (XSS) vulnerability affecting 07FLYCMS, 07FLY-CMS, and 07FlyCRM versions up to 1. 2. 9. The flaw exists in the /admin/SysModule/edit. html file within the System Extension Module, where manipulation of the Title argument allows remote attackers to inject malicious scripts. Exploitation requires high privileges and user interaction but no authentication bypass. The vendor has not responded to disclosure attempts, and no patches are currently available. Although no known exploits are in the wild, public exploit code has been released, increasing the risk of attack. This vulnerability can lead to session hijacking, defacement, or redirection attacks, impacting confidentiality and integrity. Organizations using affected versions should apply strict input validation and consider isolating or restricting access to the affected module.

AI-Powered Analysis

AILast updated: 02/23/2026, 02:46:52 UTC

Technical Analysis

CVE-2026-2965 identifies a cross-site scripting (XSS) vulnerability in the 07FLYCMS family of products, including 07FLY-CMS and 07FlyCRM, affecting all versions up to 1.2.9. The vulnerability is located in the /admin/SysModule/edit.html file, specifically within an unknown function of the System Extension Module that processes the Title argument. By manipulating this argument, an attacker can inject malicious JavaScript code that executes in the context of an authenticated administrator's browser session. The attack vector is remote, requiring the attacker to have high privileges (likely administrative access) and user interaction to trigger the payload. The vulnerability does not require authentication bypass but does require the victim to interact with the malicious input. The vendor was notified early but did not respond or provide a patch, and no official fixes are currently available. Public exploit code has been released, increasing the likelihood of exploitation despite no confirmed attacks in the wild. The CVSS 4.0 base score is 4.8 (medium severity), reflecting the moderate impact on confidentiality and integrity with limited availability impact. The vulnerability can be leveraged for session hijacking, privilege escalation, or defacement, compromising the security posture of affected systems. The product is distributed under multiple names, complicating detection and mitigation efforts.

Potential Impact

The primary impact of CVE-2026-2965 is on the confidentiality and integrity of affected systems. Successful exploitation allows attackers to execute arbitrary scripts in the context of an authenticated administrator, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions within the CMS or CRM environment. This can result in data leakage, unauthorized configuration changes, or deployment of further malware. Although availability impact is minimal, the compromise of administrative accounts can severely disrupt organizational operations. The lack of vendor response and patches increases the risk exposure, especially as public exploit code is available. Organizations relying on 07FLYCMS and its variants face increased risk of targeted attacks, especially if administrative interfaces are exposed or insufficiently protected. The medium severity rating reflects the need for timely mitigation to prevent exploitation in environments where administrative user interaction is possible.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls. First, restrict access to the /admin/SysModule/edit.html interface to trusted IP addresses or VPN-only access to reduce exposure. Implement strict input validation and sanitization on the Title parameter at the web application firewall (WAF) or reverse proxy level to block malicious script payloads. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in the browser. Educate administrators to avoid clicking on suspicious links or inputs that could trigger the XSS payload. Monitor logs for unusual activity or attempts to exploit the Title parameter. Consider isolating or segmenting the CMS/CRM administrative environment from other critical systems. If feasible, migrate to alternative CMS/CRM solutions or versions not affected by this vulnerability. Maintain regular backups and incident response plans to quickly recover from potential compromises. Finally, engage with the vendor or community for updates or unofficial patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-22T07:34:14.094Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699bbc2cbe58cf853bf32012

Added to database: 2/23/2026, 2:32:12 AM

Last enriched: 2/23/2026, 2:46:52 AM

Last updated: 2/23/2026, 7:29:36 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats