CVE-2025-14519
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-11

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in baowzh hfly up to 638ff9abe9078bc977c132b37acbe1900b63491c. This issue affects some unknown processing of the file /admin/index.php/advtext/add of the component advtext Module. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-11
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-11
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
baowzh hfly *
baowzh hfly 638ff9abe9078bc977c132b37acbe1900b63491c
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a security flaw in the baowzh hfly software affecting the advtext module, specifically the /admin/index.php/advtext/add file. It allows an attacker to perform a cross-site scripting (XSS) attack by manipulating input to this component. The attack can be executed remotely, meaning an attacker does not need local access to exploit it. The vulnerability has been publicly disclosed and an exploit is available.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to execute cross-site scripting attacks remotely. This could lead to the attacker injecting malicious scripts into web pages viewed by other users, potentially stealing session tokens, redirecting users to malicious sites, or performing actions on behalf of users without their consent. However, the CVSS scores indicate a relatively low to moderate severity, with no impact on confidentiality or availability, but some impact on integrity.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by testing the /admin/index.php/advtext/add endpoint for stored cross-site scripting (XSS) by injecting typical XSS payloads into the advtext add functionality and observing if the payload is executed when the stored content is viewed. Since a proof-of-concept exploit is publicly available on GitHub, you can use it to verify the presence of the vulnerability. Specific commands are not provided in the resources, but typical detection involves sending HTTP POST requests with XSS payloads to the vulnerable endpoint and checking the response or subsequent page rendering for script execution. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding use of the vulnerable advtext add functionality or replacing the affected component or product, as no patches or countermeasures are currently known. Additionally, applying input validation and output encoding to neutralize user-controllable input before inclusion in web pages is recommended. Since the vendor has not responded and no fixes are available, restricting access to the vulnerable endpoint and monitoring for exploitation attempts are advisable interim measures. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart