Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3742: Cross Site Scripting in YiFang CMS

0
Medium
VulnerabilityCVE-2026-3742cvecve-2026-3742
Published: Sun Mar 08 2026 (03/08/2026, 15:02:07 UTC)
Source: CVE Database V5
Vendor/Project: YiFang
Product: CMS

Description

A vulnerability was detected in YiFang CMS 2.0.5. The impacted element is the function update of the file app/db/admin/D_singlePage.php. Performing a manipulation of the argument Title results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 03/08/2026, 15:22:29 UTC

Technical Analysis

CVE-2026-3742 is a cross-site scripting (XSS) vulnerability identified in YiFang CMS version 2.0.5. The flaw exists in the update function located in the app/db/admin/D_singlePage.php file, where the 'Title' parameter is not properly sanitized or validated. This allows an attacker to inject malicious JavaScript code remotely by manipulating the Title argument. The vulnerability requires no authentication but does require some user interaction, such as an administrator or user accessing a crafted page or input. The CVSS 4.0 base score is 5.1, indicating medium severity, with attack vector being network, low attack complexity, no privileges required, and user interaction needed. The vulnerability impacts the confidentiality and integrity of the CMS by enabling attackers to execute arbitrary scripts in the context of the victim’s browser, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions on behalf of the user. The vendor was notified but has not responded or issued a patch, and public exploit code is available, increasing the risk of exploitation. No known exploits in the wild have been reported yet, but the presence of public exploits means attackers can leverage this vulnerability easily. The lack of a patch and vendor response necessitates immediate attention from organizations using this CMS version.

Potential Impact

The exploitation of CVE-2026-3742 can lead to significant security risks for organizations running YiFang CMS 2.0.5. Attackers can execute arbitrary JavaScript in the context of administrative or user sessions, potentially leading to session hijacking, credential theft, unauthorized actions, or defacement of websites. This compromises the confidentiality and integrity of the affected systems and their data. Although availability impact is minimal, the reputational damage and potential data breaches can be severe. Organizations relying on this CMS for public-facing websites or internal portals may face targeted attacks, especially if the CMS is used in sensitive sectors. The public availability of exploit code increases the likelihood of automated attacks and widespread exploitation, particularly in environments where patching is delayed or vendor support is lacking.

Mitigation Recommendations

Organizations should immediately audit their use of YiFang CMS and identify any instances running version 2.0.5. Since no official patch is available, administrators should implement input validation and output encoding on the 'Title' parameter at the web application firewall (WAF) or reverse proxy level to block malicious scripts. Restrict administrative access to trusted IP addresses and enforce multi-factor authentication to reduce the risk of exploitation. Monitor web server logs for suspicious requests targeting the vulnerable parameter. Consider deploying Content Security Policy (CSP) headers to limit the execution of unauthorized scripts. If feasible, migrate to a different CMS or a patched version once available. Regular backups and incident response plans should be updated to prepare for potential exploitation scenarios. Engage with the vendor or community for updates and patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T20:12:21.498Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ad90c22904315ca3ba6b11

Added to database: 3/8/2026, 3:07:46 PM

Last enriched: 3/8/2026, 3:22:29 PM

Last updated: 3/10/2026, 10:15:40 PM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses