VYPR
Medium severity4.3NVD Advisory· Published Sep 11, 2025· Updated Apr 29, 2026

CVE-2025-10272

CVE-2025-10272

Description

A vulnerability was determined in erjinzhi 10OA 1.0. Affected is an unknown function of the file /trial/mvc/catalogue. This manipulation of the argument Name causes cross site scripting. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in erjinzhi 10OA 1.0's /trial/mvc/catalogue endpoint allows remote attackers to inject arbitrary JavaScript via the Name parameter.

Vulnerability

Overview

A reflected Cross-Site Scripting (XSS) vulnerability exists in erjinzhi 10OA version 1.0, specifically in the /trial/mvc/catalogue endpoint. The root cause is insufficient input sanitization of the Name parameter in GET requests. When a crafted payload is supplied, it is reflected back in the server's response and executed in the victim's browser upon user interaction, such as a mouse hover event [1].

Exploitation

The attack can be initiated remotely without requiring authentication or authorization. An attacker can craft a malicious URL containing a JavaScript payload in the Name parameter (e.g., ?name=<a/+/onmoUsEOver+=+confirm()>v3dm0s) and trick a user into clicking or hovering over the link. The payload executes in the context of the victim's browser, making this a low-complexity attack vector [1].

Impact

Successful exploitation allows an attacker to perform actions on behalf of an authenticated user, steal sensitive session data (e.g., cookies), or conduct phishing attacks against users of the OA system. Since no login is required to trigger the vulnerability, it poses a significant risk to any user visiting the affected endpoint [1].

Mitigation

The vendor was contacted but did not respond, and no official patch has been released. Users are advised to implement input validation and output encoding for the Name parameter, or to restrict access to the /trial/mvc/catalogue endpoint until a fix is available [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.