CVE-2025-10944
Description
A weakness has been identified in yi-ge get-header-ip up to 589b23d0eb0043c310a6a13ce4bbe2505d0d0b15. This issue affects the function ip of the file ip.php. This manipulation of the argument callback causes cross site scripting. The attack may be initiated remotely. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in yi-ge/get-header-ip's ip.php allows remote attackers to inject arbitrary JavaScript via the callback parameter.
The vulnerability resides in the ip function within ip.php of the yi-ge/get-header-ip library (up to commit 589b23d0eb0043c310a6a13ce4bbe2505d0d0b15). The function directly incorporates the user-supplied callback argument into the response without proper sanitization or encoding, leading to a reflected cross-site scripting (XSS) flaw [1].
An attacker can exploit this by crafting a malicious URL that includes a callback parameter containing JavaScript payload. The attack is remotely initiated and does not require authentication, as the vulnerable endpoint is publicly accessible. The victim only needs to visit the crafted link, for example via phishing or social engineering.
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser. This can lead to session hijacking, credential theft, or defacement of the page. The CVSS v3 base score of 3.5 reflects the low severity due to the need for user interaction and the limited impact on confidentiality and integrity.
The vendor was contacted but did not respond, and the library follows a rolling release model without specific version tags. As of the publication date, no official patch is available. Users are advised to avoid using the library or to implement input validation and output encoding for the callback parameter as a workaround.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.