CVE-2025-10366
BaseFortify
Publication date: 2025-09-13
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sourcefabric | rpi-jukebox-rfid | to 2.8.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a cross-site scripting (XSS) flaw found in MiczFlor RPi-Jukebox-RFID up to version 2.8.0. It occurs due to improper handling of the Email address argument in the file /htdocs/inc.setWlanIpMail.php, allowing an attacker to inject malicious scripts. The attack can be initiated remotely, and an exploit has been published.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute malicious scripts in the context of the affected application, potentially leading to unauthorized actions or manipulation of user interactions. However, the CVSS scores indicate a low to moderate impact, with no confidentiality or availability impact but some integrity impact, meaning it may allow limited unauthorized changes but not data theft or service disruption.