VYPR
Medium severity6.1NVD Advisory· Published May 11, 2026· Updated May 12, 2026

CVE-2025-61305

CVE-2025-61305

Description

A reflected cross-site scripted (XSS) vulnerability in the dfm-menu_firmware.php component of GmbH Mecury Managed Print Services (docuForm) v11.11c allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into an unfiltered variable value.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A reflected XSS vulnerability in docuForm Mercury Managed Print Services v11.11c allows attackers to execute arbitrary JavaScript by injecting a crafted payload into an unfiltered parameter of the dfm-menu_firmware.php component.

Root

Cause CVE-2026年5月发布的CVE-2025-61305中描述了一个反射型跨站脚本(XSS)漏洞,位于docuForm Mercury Managed Print Services v11.11c的dfm-menu_firmware.php组件中。该漏洞是由于在处理用户可控输入时未能进行充分的中和(sanitization),导致未过滤的参数值被直接嵌入到动态生成的网页中[1][2]。攻击者可以通过精心构造的载荷注入任意JavaScript代码,当其他用户访问该页面时,恶意脚本会在其浏览器中执行。

## 攻击向量与利用条件 该漏洞为反射型XSS属于反射型,攻击者需要诱导受害者点击一个特制的链接,该链接包含了经过编码的恶意payload。由于组件未对输入变量进行正确过滤或编码,使得恶意脚本能够在受害者的浏览器上下文中运行[2]。攻击不需要提前认证,但需要用户交互。

## 影响 成功利用此漏洞,攻击者可以在受害用户浏览器中执行任意JavaScript,窃取会话标识符、Cookie或敏感信息,并可能以受害者身份执行未授权操作,如配置文件修改或执行其他敏感功能。风险等级为中等严重性评分(CVSS 6.1)反映了利用依赖用户交互,但网络可利用性高。

## 缓解措施 供应商docuFORM已收到报告,并在2025年11月发布了修复程序[2]。建议用户立即升级到受影响版本(v11.11c之后的修复版本。如果无法立即升级,应实施严格的输入验证和输出编码策略,直到可以应用官方补丁。

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.