CVE-2025-10711

4.3 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in 07FLYCMS, 07FLY-CMS, and 07FlyCRM products. Attackers can inject malicious scripts via the Name parameter in the login page, potentially compromising user sessions or stealing credentials. Organizations using these CMS products up to August 31, 2025 are affected.

💻 Affected Systems

Products:
  • 07FLYCMS
  • 07FLY-CMS
  • 07FlyCRM
Versions: All versions up to and including 20250831
Operating Systems: Any OS running the affected CMS
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the login page specifically, making it critical for authentication security.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, take over administrative accounts, deface websites, or distribute malware to users visiting the compromised login page.

🟠

Likely Case

Attackers inject malicious JavaScript to steal session cookies or credentials from users accessing the login page, potentially leading to account compromise.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized, preventing any successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available on GitHub, making this easily exploitable by attackers with basic web security knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Consider upgrading to a version after 20250831 if released, or implement workarounds.

🔧 Temporary Workarounds

Input Validation and Sanitization

all

Implement server-side validation and HTML encoding for the Name parameter in the login handler.

Implement proper input sanitization in /index.php/sysmanage/Login

Content Security Policy (CSP)

all

Deploy a strict CSP header to prevent execution of injected scripts.

Add: Content-Security-Policy: default-src 'self'; script-src 'self'

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules
  • Disable or restrict access to the vulnerable login page if possible

🔍 How to Verify

Check if Vulnerable:

Test the Name parameter in /index.php/sysmanage/Login with XSS payloads like <script>alert('XSS')</script>

Check Version:

Check CMS version in admin panel or configuration files

Verify Fix Applied:

Verify that XSS payloads are properly sanitized and do not execute in the browser

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /index.php/sysmanage/Login with script tags or JavaScript in parameters

Network Indicators:

  • HTTP requests containing malicious script payloads in the Name parameter

SIEM Query:

source="web_logs" AND uri="/index.php/sysmanage/Login" AND (param="Name" AND value MATCHES "<script.*>.*</script>" OR "javascript:")

🔗 References

📤 Share & Export