CVE-2025-2709

A vulnerability has been found in Yonyou UFIDA ERP-NC 5.0 and classified as problematic. This vulnerability affects unknown code of the file /login.jsp. The manipulation of the argument key/redirect leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/Hebing123/cve/issues/84 Exploit Issue Tracking Third Party Advisory
https://github.com/Hebing123/cve/issues/84 Exploit Issue Tracking Third Party Advisory
https://vuldb.com/?ctiid.300730 Permissions Required VDB Entry
https://vuldb.com/?id.300730 Third Party Advisory VDB Entry
https://vuldb.com/?submit.517305 Third Party Advisory VDB Entry Exploit
Configurations

Configuration 1 (hide)

cpe:2.3:a:yonyou:ufida_erp-nc:5.0:*:*:*:*:*:*:*

History

09 Jul 2025, 00:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CWE CWE-79
References () https://vuldb.com/?ctiid.300730 - () https://vuldb.com/?ctiid.300730 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.517305 - () https://vuldb.com/?submit.517305 - Third Party Advisory, VDB Entry, Exploit
References () https://vuldb.com/?id.300730 - () https://vuldb.com/?id.300730 - Third Party Advisory, VDB Entry
References () https://github.com/Hebing123/cve/issues/84 - () https://github.com/Hebing123/cve/issues/84 - Exploit, Issue Tracking, Third Party Advisory
CPE cpe:2.3:a:yonyou:ufida_erp-nc:5.0:*:*:*:*:*:*:*
First Time Yonyou ufida Erp-nc
Yonyou

25 Mar 2025, 14:15

Type Values Removed Values Added
CWE CWE-94
CWE-79
CVSS v2 : unknown
v3 : 4.3
v2 : unknown
v3 : unknown

24 Mar 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-24 20:15

Updated : 2025-07-09 00:32


NVD link : CVE-2025-2709

Mitre link : CVE-2025-2709


JSON object : View

Products Affected

yonyou

  • ufida_erp-nc
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')