VYPR
Medium severity4.3NVD Advisory· Published Sep 14, 2025· Updated Apr 29, 2026

CVE-2025-10386

CVE-2025-10386

Description

A vulnerability was found in Yida ECMS Consulting Enterprise Management System 1.0. This affects an unknown part of the file /login.do of the component POST Request Handler. The manipulation of the argument requestUrl results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in Yida ECMS Consulting Enterprise Management System 1.0's /login.do endpoint allows remote attackers to inject arbitrary JavaScript via the requestUrl parameter.

Vulnerability

Overview

The vulnerability is a reflected Cross-Site Scripting (XSS) issue in the Yida ECMS Consulting Enterprise Management System version 1.0. It resides in the /login.do endpoint, specifically within the POST request handler. The root cause is insufficient input sanitization of the requestUrl parameter, allowing an attacker to inject arbitrary JavaScript payloads that are reflected back in the server's response [1].

Exploitation

Exploitation can be performed remotely without requiring authentication. An attacker crafts a POST request to /login.do with a malicious payload in the requestUrl parameter. The payload is reflected and executed in the victim's browser upon user interaction, such as a mouse hover event, as demonstrated by the proof-of-concept payload requestUrl="><a%09oNmOuseovEr+=+(confirm)()%0dx>v3dm0s [1].

Impact

Successful exploitation enables an attacker to perform actions on behalf of authenticated users, steal sensitive session data, or conduct phishing attacks against users of the OA system. This can lead to unauthorized access and data compromise [1].

Mitigation

The vendor was contacted but did not respond, and no official patch is available. Users are advised to implement input validation and output encoding for the requestUrl parameter, or deploy web application firewall (WAF) rules to block malicious payloads until a fix is released [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.