Description
A vulnerability was detected in EyouCMS up to 1.7.7. The affected element is an unknown function of the file application/home/model/Ask.php of the component Ask Module. Performing a manipulation of the argument content results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
Problem types
Timeline
| 2025-12-30: | Advisory disclosed |
| 2025-12-30: | VulDB entry created |
| 2026-01-01: | VulDB entry last update |
Credits
pemic (VulDB User)
References
note-hxlab.wetolink.com/share/LNickWiRaFiF
note-hxlab.wetolink.com/share/LNickWiRaFiF
vuldb.com/?id.339082 (VDB-339082 | EyouCMS Ask Module Ask.php cross site scripting)
vuldb.com/?ctiid.339082 (VDB-339082 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/?submit.718480 (Submit #718480 | EyouCMS 1.7.7 Cross Site Scripting)
note-hxlab.wetolink.com/share/LNickWiRaFiF
note-hxlab.wetolink.com/share/LNickWiRaFiF