CVE-2026-3742
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to inject malicious scripts into a web page, which can then execute in the browsers of users visiting that page, potentially stealing their information or performing actions on their behalf. The attacker can exploit this remotely by manipulating a specific input field in the YiFang CMS software, and the issue is already public, meaning it could be exploited by anyone without needing special access.
Technical Description
A vulnerability was detected in YiFang CMS 2.0.5. The impacted element is the function update of the file app/db/admin/D_singlePage.php. Performing a manipulation of the argument Title results in cross site scripting. It is possible to initiate the attack remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 8, 2026
about 1 month ago
Last Modified
Mar 10, 2026
28 days ago
Vendor
yifangcms
Product
yifang
Related Vulnerabilities
An attacker can exploit a vulnerability in YiFang CMS to inject malicious scripts into web pages, potentially allowing them to steal sensitive information from users who visit those pages. This can be done remotely by manipulating a specific input field, and the issue is already known and can be actively exploited.
An attacker can inject malicious scripts into a website using a vulnerability in YiFang CMS, allowing them to execute harmful code in the browsers of users who visit the affected site. This can be done remotely by manipulating a specific input field, and since the vendor has not responded to the issue, it remains a risk for users of the software.
An attacker can inject malicious scripts into a web page through a vulnerable part of the YiFang CMS, allowing them to execute harmful actions on users' browsers. This vulnerability affects versions up to 2.0.5 and can be exploited remotely without needing to be on the same network.
An attacker can inject malicious scripts into the YiFang CMS, allowing them to execute harmful actions in the context of a user's browser. This vulnerability can be exploited remotely by manipulating a specific input field in the system's management module, and the exploit is publicly available.
An attacker can use this vulnerability to inject malicious scripts into a web page viewed by other users, potentially stealing their information or performing actions on their behalf. This can be done remotely by manipulating specific input fields in the YiFang CMS software, which is vulnerable in versions up to 2.0.5.