VYPR
Medium severityNVD Advisory· Published Jan 20, 2026· Updated Apr 15, 2026

CVE-2025-40644

CVE-2025-40644

Description

Reflected Cross-Site Scripting (XSS) vulnerability in Riftzilla's QRGen. This vulnerability allows an attavker to execute JavaScript code in the victim's browser by sending them a malicious URL using the 'id' parameter in '/article.php'. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

QRGen by Riftzilla has a reflected XSS flaw in article.php via the id parameter, enabling cookie theft or malicious actions.

Vulnerability

Overview

CVE-2025-40644 is a reflected Cross-Site Scripting (XSS) vulnerability affecting QRGen by Riftzilla, a QR code generation application. The flaw exists in the /article.php script, where the id parameter fails to sanitize user-supplied input. An attacker can craft a malicious URL containing JavaScript code in the id parameter, which, when visited by a victim, will execute in the context of the vulnerable application. This is a classic CWE-79 weakness. [1]

Exploitation

Details

The vulnerability is remotely exploitable without authentication (CVSS v4.0 vector AV:N/AC:L/AT:N/PR:N/UI:A). The attacker must convince the victim to click a specially crafted link, requiring user interaction. No privileged network position is needed; the attack surface is simply the public-facing /article.php endpoint. [1]

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the victim's browser. This can be used to steal session cookies, capture keystrokes, or perform actions on behalf of the victim within the application's security context, compromising user data and session integrity. [1]

Mitigation

As of the advisory publication date (January 20, 2026), no official patch or workaround has been released by the vendor. The vulnerability remains unaddressed. INCIBE coordinated the disclosure, and the discoverer is Gonzalo Aguilar García (6h4ack). Until a fix is supplied, users should avoid clicking untrusted links and consider using web application firewall rules to filter malicious input. [1]

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.