CVE-2026-2934
Plain English Summary
AI-powered analysis for quick understanding
An attacker can inject malicious scripts into a web page through a vulnerable part of the YiFang CMS, allowing them to execute harmful actions on users' browsers. This vulnerability affects versions up to 2.0.5 and can be exploited remotely without needing to be on the same network.
Technical Description
A security vulnerability has been detected in YiFang CMS up to 2.0.5. This impacts the function update of the file app/db/admin/D_friendLinkGroup.php of the component Extended Management Module. The manipulation of the argument Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 22, 2026
about 1 month ago
Last Modified
Feb 24, 2026
about 1 month ago
Vendor
yifangcms
Product
yifang
Related Vulnerabilities
An attacker can exploit a vulnerability in YiFang CMS to inject malicious scripts into web pages, potentially allowing them to steal sensitive information from users who visit those pages. This can be done remotely by manipulating a specific input field, and the issue is already known and can be actively exploited.
This vulnerability allows an attacker to inject malicious scripts into a web page, which can then execute in the browsers of users visiting that page, potentially stealing their information or performing actions on their behalf. The attacker can exploit this remotely by manipulating a specific input field in the YiFang CMS software, and the issue is already public, meaning it could be exploited by anyone without needing special access.
An attacker can inject malicious scripts into a website using a vulnerability in YiFang CMS, allowing them to execute harmful code in the browsers of users who visit the affected site. This can be done remotely by manipulating a specific input field, and since the vendor has not responded to the issue, it remains a risk for users of the software.
An attacker can inject malicious scripts into the YiFang CMS, allowing them to execute harmful actions in the context of a user's browser. This vulnerability can be exploited remotely by manipulating a specific input field in the system's management module, and the exploit is publicly available.
An attacker can use this vulnerability to inject malicious scripts into a web page viewed by other users, potentially stealing their information or performing actions on their behalf. This can be done remotely by manipulating specific input fields in the YiFang CMS software, which is vulnerable in versions up to 2.0.5.