A security flaw has been discovered in erjinzhi 10OA 1.0. Affected by this issue is some unknown functionality of the file /trial/mvc/item. Performing manipulation of the argument Name results in cross site scripting. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
References
| Link | Resource |
|---|---|
| https://github.com/1276486/CVE/issues/9 | Exploit Issue Tracking Third Party Advisory |
| https://vuldb.com/?ctiid.323644 | Permissions Required VDB Entry |
| https://vuldb.com/?id.323644 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.643050 | Third Party Advisory VDB Entry |
| https://github.com/1276486/CVE/issues/9 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-09-12 01:15
Updated : 2025-10-02 19:23
NVD link : CVE-2025-10274
Mitre link : CVE-2025-10274
CVE.ORG link : CVE-2025-10274
JSON object : View
Products Affected
10oa
- 10oa
