Description
A vulnerability was detected in EyouCMS up to 1.7.7. The affected element is an unknown function of the file application/home/model/Ask.php of the component Ask Module. Performing manipulation of the argument content results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
References
https://note-hxlab.wetolink.com/share/LNickWiRaFiF
https://note-hxlab.wetolink.com/share/LNickWiRaFiF#-span--strong-proof-of-concept---strong---span-
https://vuldb.com/?ctiid.339082
https://vuldb.com/?submit.718480
https://note-hxlab.wetolink.com/share/LNickWiRaFiF
https://note-hxlab.wetolink.com/share/LNickWiRaFiF#-span--strong-proof-of-concept---strong---span-
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
3.5 · Low
Information
Source identifier
Vulnerability status
Modified
Published
2025-12-31T04:16:03.670Z
3 weeks agoLast modified
2026-01-02T14:15:58.870Z
2 weeks ago