CVE-2025-15374

A vulnerability was detected in EyouCMS up to 1.7.7. The affected element is an unknown function of the file application/home/model/Ask.php of the component Ask Module. Performing a manipulation of the argument content results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".
Configurations

Configuration 1 (hide)

cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*

History

24 Feb 2026, 07:17

Type Values Removed Values Added
Summary (en) A vulnerability was detected in EyouCMS up to 1.7.7. The affected element is an unknown function of the file application/home/model/Ask.php of the component Ask Module. Performing manipulation of the argument content results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8". (en) A vulnerability was detected in EyouCMS up to 1.7.7. The affected element is an unknown function of the file application/home/model/Ask.php of the component Ask Module. Performing a manipulation of the argument content results in cross site scripting. The attack can be initiated remotely. The exploit is now public and may be used. The vendor is "[a]cknowledging the existence of the vulnerability, we have completed the fix and will release a new version, v1.7.8".

02 Jan 2026, 15:15

Type Values Removed Values Added
References () https://note-hxlab.wetolink.com/share/LNickWiRaFiF - Exploit, Third Party Advisory () https://note-hxlab.wetolink.com/share/LNickWiRaFiF - Exploit, Third Party Advisory
References () https://note-hxlab.wetolink.com/share/LNickWiRaFiF#-span--strong-proof-of-concept---strong---span- - Exploit, Third Party Advisory () https://note-hxlab.wetolink.com/share/LNickWiRaFiF#-span--strong-proof-of-concept---strong---span- - Exploit, Third Party Advisory

31 Dec 2025, 21:53

Type Values Removed Values Added
First Time Eyoucms
Eyoucms eyoucms
CPE cpe:2.3:a:eyoucms:eyoucms:*:*:*:*:*:*:*:*
References () https://note-hxlab.wetolink.com/share/LNickWiRaFiF - () https://note-hxlab.wetolink.com/share/LNickWiRaFiF - Exploit, Third Party Advisory
References () https://note-hxlab.wetolink.com/share/LNickWiRaFiF#-span--strong-proof-of-concept---strong---span- - () https://note-hxlab.wetolink.com/share/LNickWiRaFiF#-span--strong-proof-of-concept---strong---span- - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.339082 - () https://vuldb.com/?ctiid.339082 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.339082 - () https://vuldb.com/?id.339082 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.718480 - () https://vuldb.com/?submit.718480 - Third Party Advisory, VDB Entry

31 Dec 2025, 05:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-31 05:16

Updated : 2026-02-24 07:17


NVD link : CVE-2025-15374

Mitre link : CVE-2025-15374

CVE.ORG link : CVE-2025-15374


JSON object : View

Products Affected

eyoucms

  • eyoucms
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-94

Improper Control of Generation of Code ('Code Injection')