{"api_version":"1","generated_at":"2026-05-13T23:36:21+00:00","cve":"CVE-2026-2965","urls":{"html":"https://cve.report/CVE-2026-2965","api":"https://cve.report/api/cve/CVE-2026-2965.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-2965","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-2965"},"summary":{"title":"07FLYCMS/07FLY-CMS/07FlyCRM System Extension edit.html cross site scripting","description":"A security flaw has been discovered in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.2.9. The affected element is an unknown function of the file /admin/SysModule/edit.html of the component System Extension Module. Performing a manipulation of the argument Title results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-02-23 03:15:58","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-79","CWE-94","CWE-79 Cross Site Scripting","CWE-94 Code Injection"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"1.9","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"4.8","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","data":{"baseScore":4.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Primary","score":"2.4","severity":"LOW","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"2.4","severity":"LOW","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","data":{"baseScore":2.4,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"2.4","severity":"LOW","vector":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","data":{"baseScore":2.4,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"3.3","severity":"","vector":"AV:N/AC:L/Au:M/C:N/I:P/A:N","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N","baseScore":3.3,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"MULTIPLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"3.3","severity":"","vector":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR","data":{"baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://vuldb.com/?ctiid.347332","name":"https://vuldb.com/?ctiid.347332","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.notion.so/07FlyCRM-Stored-Cross-Site-Scripting-XSS-in-SysModule-module-303ea92a3c4180d3a9a8e9f6c3d2915a?v=2ffea92a3c418057a8b7000c66564aa1","name":"https://www.notion.so/07FlyCRM-Stored-Cross-Site-Scripting-XSS-in-SysModule-module-303ea92a3c4180d3a9a8e9f6c3d2915a?v=2ffea92a3c418057a8b7000c66564aa1","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?submit.755225","name":"https://vuldb.com/?submit.755225","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?id.347332","name":"https://vuldb.com/?id.347332","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-2965","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2965","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLYCMS","version":"affected 1.2.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FLY-CMS","version":"affected 1.2.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"07FlyCRM","version":"affected 1.2.9","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-02-22T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-02-22T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-02-22T08:39:17.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"din4 (VulDB User)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-2965","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-02-23T13:46:39.139911Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-02-23T13:46:48.205Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"modules":["System Extension Module"],"product":"07FLYCMS","vendor":"n/a","versions":[{"status":"affected","version":"1.2.0"},{"status":"affected","version":"1.2.1"},{"status":"affected","version":"1.2.2"},{"status":"affected","version":"1.2.3"},{"status":"affected","version":"1.2.4"},{"status":"affected","version":"1.2.5"},{"status":"affected","version":"1.2.6"},{"status":"affected","version":"1.2.7"},{"status":"affected","version":"1.2.8"},{"status":"affected","version":"1.2.9"}]},{"modules":["System Extension Module"],"product":"07FLY-CMS","vendor":"n/a","versions":[{"status":"affected","version":"1.2.0"},{"status":"affected","version":"1.2.1"},{"status":"affected","version":"1.2.2"},{"status":"affected","version":"1.2.3"},{"status":"affected","version":"1.2.4"},{"status":"affected","version":"1.2.5"},{"status":"affected","version":"1.2.6"},{"status":"affected","version":"1.2.7"},{"status":"affected","version":"1.2.8"},{"status":"affected","version":"1.2.9"}]},{"modules":["System Extension Module"],"product":"07FlyCRM","vendor":"n/a","versions":[{"status":"affected","version":"1.2.0"},{"status":"affected","version":"1.2.1"},{"status":"affected","version":"1.2.2"},{"status":"affected","version":"1.2.3"},{"status":"affected","version":"1.2.4"},{"status":"affected","version":"1.2.5"},{"status":"affected","version":"1.2.6"},{"status":"affected","version":"1.2.7"},{"status":"affected","version":"1.2.8"},{"status":"affected","version":"1.2.9"}]}],"credits":[{"lang":"en","type":"reporter","value":"din4 (VulDB User)"}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.2.9. The affected element is an unknown function of the file /admin/SysModule/edit.html of the component System Extension Module. Performing a manipulation of the argument Title results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"baseScore":4.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":2.4,"baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":2.4,"baseSeverity":"LOW","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":3.3,"vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"Cross Site Scripting","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-94","description":"Code Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-02-23T01:32:08.157Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-347332 | 07FLYCMS/07FLY-CMS/07FlyCRM System Extension edit.html cross site scripting","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.347332"},{"name":"VDB-347332 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.347332"},{"name":"Submit #755225 | 零起飞 07FlyCRM ≤1.2.9 Cross Site Scripting","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.755225"},{"tags":["exploit"],"url":"https://www.notion.so/07FlyCRM-Stored-Cross-Site-Scripting-XSS-in-SysModule-module-303ea92a3c4180d3a9a8e9f6c3d2915a?v=2ffea92a3c418057a8b7000c66564aa1"}],"timeline":[{"lang":"en","time":"2026-02-22T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-02-22T01:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-02-22T08:39:17.000Z","value":"VulDB entry last update"}],"title":"07FLYCMS/07FLY-CMS/07FlyCRM System Extension edit.html cross site scripting"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-2965","datePublished":"2026-02-23T01:32:08.157Z","dateReserved":"2026-02-22T07:34:14.094Z","dateUpdated":"2026-02-23T13:46:48.205Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-02-23 03:15:58","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-79","CWE-94","CWE-79 Cross Site Scripting","CWE-94 Code Injection"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N","baseScore":2.4,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":1.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:M/C:N/I:P/A:N","baseScore":3.3,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"MULTIPLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"2965","Ordinal":"1","Title":"07FLYCMS/07FLY-CMS/07FlyCRM System Extension edit.html cross sit","CVE":"CVE-2026-2965","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"2965","Ordinal":"1","NoteData":"A security flaw has been discovered in 07FLYCMS, 07FLY-CMS and 07FlyCRM up to 1.2.9. The affected element is an unknown function of the file /admin/SysModule/edit.html of the component System Extension Module. Performing a manipulation of the argument Title results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. This product is published under multiple names. The vendor was contacted early about this disclosure but did not respond in any way.","Type":"Description","Title":"07FLYCMS/07FLY-CMS/07FlyCRM System Extension edit.html cross sit"}]}}}