VYPR
Low severity3.5NVD Advisory· Published Sep 25, 2025· Updated Apr 15, 2026

CVE-2025-10946

CVE-2025-10946

Description

A vulnerability was detected in nuz007 smsboom up to 01b2f35bbbc23f3e0f60f38ca0e3d1b286f8d674. The affected element is an unknown function of the file dy.php. Performing manipulation of the argument hm results in cross site scripting. Remote exploitation of the attack is possible. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected cross-site scripting vulnerability exists in nuz007/smsboom's dy.php file via the hm parameter, allowing remote attacks.

Vulnerability

Overview

A reflected cross-site scripting (XSS) vulnerability has been identified in the nuz007/smsboom project, specifically in the dy.php file. The issue arises from improper sanitization of the hm argument, which is directly reflected in the output without proper encoding or validation [1]. The affected commit is 01b2f35bbbc23f3e0f60f38ca0e3d1b286f8d674, and the project follows a rolling release model, meaning specific version numbers for affected or patched releases are not provided.

Exploitation

An attacker can exploit this vulnerability by crafting a malicious URL containing a JavaScript payload in the hm parameter. When a victim visits the crafted URL, the payload executes in the context of the victim's browser. No authentication is required, and the attack can be performed remotely over the network. The attack complexity is low, but user interaction is required (the victim must click the link).

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the victim's browser. This can lead to session hijacking, for example, session hijacking, defacement, or redirection to malicious sites. The CVSS v3 base score is 3.5 (Low), reflecting the need for user interaction and the limited scope of impact.

Mitigation

As of the publication date, no official patch has been released. Users are advised to sanitize the hm parameter in dy.php by escaping HTML entities or using a content security policy. Given the rolling release model, users should monitor the maintainer may address this in a future commit.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.