CVE-2025-10711
Description
A vulnerability has been found in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 20250831. This vulnerability affects unknown code of the file /index.php/sysmanage/Login. Such manipulation of the argument Name leads to cross site scripting. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Reflected XSS in 07FLYCMS Login allows remote unauthenticated attackers to inject arbitrary JavaScript via the name parameter.
A reflected Cross-Site Scripting (XSS) vulnerability has been identified in 07FLYCMS, 07FLY-CMS, and 07FlyCRM up to version 20250831. The flaw resides in the file /index.php/sysmanage/Login and is due to insufficient sanitization of the Name parameter in GET requests [1]. When a crafted payload is supplied to this parameter, the server reflects it back into the response without proper encoding, enabling script execution in the victim's browser.
Exploitation does not require authentication, as the login page is publicly accessible [1]. An attacker can inject a malicious JavaScript payload, for example by appending ;%3Cimg%20src%3Dxyz%20onerror%3Dalert(1)%3E to the URL. The attack is performed remotely, and the crafted link can be delivered via email, social media, or other channels to lure victims [1].
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's session on the affected ERP system. This can lead to theft of sensitive session tokens, impersonation of authenticated users, or redirection to phishing pages [1].
The vendor was contacted but did not respond, and no official patch has been released [CVE description]. As a workaround, input validation and output encoding should be implemented for the Name parameter. However, given the lack of vendor response, users are advised to consider alternative solutions or deploy web application firewall (WAF) rules to mitigate the risk.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.