VYPR
Medium severity5.4NVD Advisory· Published Dec 31, 2025· Updated Apr 15, 2026

CVE-2021-47725

CVE-2021-47725

Description

STVS ProVision 5.9.10 contains a cross-site scripting vulnerability in the 'files' POST parameter that allows authenticated attackers to inject arbitrary HTML code. Attackers can exploit the unvalidated input to execute malicious scripts within a user's browser session in the context of the affected site.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

STVS ProVision 5.9.10 contains an authenticated reflected XSS vulnerability via the 'files' POST parameter, allowing arbitrary HTML injection.

Vulnerability

Description

STVS ProVision 5.9.10 suffers from a reflected cross-site scripting (XSS) vulnerability in the 'files' POST parameter. The application fails to properly sanitize user input before reflecting it back in the response, allowing an authenticated attacker to inject arbitrary HTML or JavaScript code [1][3]. This issue affects multiple versions of the software, including 5.9.10, 5.9.9, and earlier releases [4].

Exploitation

An attacker with valid credentials can craft a malicious POST request to the /archive/download endpoint with a payload in the files parameter. For example, sending files=<script>alert(document.URL)</script> triggers execution of the script in the victim's browser when the response is rendered [3]. The vulnerability is reflected, meaning the payload is immediately executed in the context of the affected site without requiring additional interaction beyond rendering the response [4].

Impact

Successful exploitation allows the attacker to execute arbitrary HTML and JavaScript in the browser session of any user who receives the crafted response. This can lead to session hijacking, defacement, or theft of sensitive information within the context of the STVS ProVision application [1][4]. Because the attacker must be authenticated, the attack surface is limited to authenticated users, but the impact is still significant for organizational deployments.

Mitigation

Status

As of the publication date, no official patch has been released by the vendor. The vulnerability was disclosed by Zero Science Lab on January 19, 2021, after the vendor failed to respond within a reasonable timeframe [1]. Affected versions include 5.9.10, 5.9.9, 5.9.7, 5.9.1, 5.9.0, 5.8.6, 5.7, 5.6, and 5.5 [3][4]. Administrators should consider applying input validation or upgrading to a patched version if one becomes available.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.