VYPR
Medium severity6.5NVD Advisory· Published Jul 9, 2025· Updated Apr 15, 2026

CVE-2021-27961

CVE-2021-27961

Description

evesys 7.1 (2152) through 8.0 (2202) allows Reflected XSS via the indexeva.php action parameter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Evasys 7.1 through 8.0 is vulnerable to reflected XSS via the indexeva.php action parameter without proper sanitization.

Vulnerability

Analysis

CVE-2021-27961 describes a reflected cross-site scripting (XSS) vulnerability in Evasys survey software versions 7.1 (2152) through 8.0 (2202). The flaw resides in the indexeva.php script, specifically within the action GET parameter. The application fails to sanitize or validate user-supplied input before including it in the response, allowing an attacker to inject arbitrary HTML or JavaScript [1][2].

Attack

Vector and Prerequisites

The vulnerability is exploitable by sending a crafted URL to a victim that includes malicious payloads in the action parameter. A proof-of-concept demonstrates that injecting "><img src=x onpointerenter="alert()" triggers script execution. No authentication is required to reach the vulnerable endpoint, though the victim must click or interact with the link (e.g., via email or a compromised site) as a reflected XSS vector. The attack surface is limited to users who access the manipulated URL [2].

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session with the Evasys application. This can lead to session hijacking, defacement, or theft of sensitive data, such as survey responses or authentication tokens, depending on the application's functionality. The CVSS v3 base score of 6.5 (Medium) reflects a significant confidentiality and integrity impact without requiring special privileges [1][2].

Mitigation

Users should upgrade to a patched version of Evasys beyond 8.0 (2202). The vendor's blog may contain additional guidance. Given that this CVE was published in 2025 but refers to older software versions, administrators of impacted deployments should verify their current version and apply vendor-recommended updates or security patches to mitigate the risk [1][2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.