CVE-2025-70845
Medium
|6.1No Exploit
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into the settings page of the lty628 aidigu application, which could then execute in the browsers of users visiting that page. To exploit this, the attacker needs to have access to the "intro" field on the settings page, where user input is not properly checked for harmful content.
Technical Description
lty628 aidigu v1.9.1 is vulnerable to Cross Site Scripting (XSS) exists in the /setting/ page where the "intro" field is not properly sanitized or escaped.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactLow
Integrity ImpactLow
Availability ImpactNone
ScopeChanged
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$862($500-$1K)
Vendor Response
Grade APatched in 0 days
Quick Information
Published
Feb 12, 2026
8 days ago
Last Modified
Feb 13, 2026
7 days ago