Description
A reflected cross-site scripted (XSS) vulnerability in the dfm-menu_coveragealerts.php component of GmbH Mecury Managed Print Services (docuForm) v11.11c allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into an unfiltered variable value.
Published: 2026-05-11
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A reflected cross‑site scripting (XSS) vulnerability exists in the dfm‑menu_coveragealerts.php component of the docuForm Managed Print Services platform. An attacker can inject arbitrary JavaScript by supplying a crafted payload in an unfiltered variable. The injected script would execute in the victim’s browser context. The primary consequence is that a malicious script runs with the privileges of the user who views the page; the specific outcomes (such as session hijacking or credential theft) depend on the attacker’s intent and are not detailed in the CVE description. Based on the description, it is inferred that the attacker would need to entice a user to visit a crafted URL that includes the malicious payload.

Affected Systems

The flaw is present in docuForm version 11.11c and is not known to affect other releases or vendor products, so the impact is confined to installations running that specific version of the application.

Risk and Exploitability

The vulnerability is a reflected XSS that can be triggered when a user follows a link or submits a form containing malicious data. Since the payload is delivered client‑side, the main risk is to the end user. No known exploits or infected campaigns are reported; the EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack requires user interaction with crafted content; this is inferred from the definition of reflected XSS.

Generated by OpenCVE AI on May 11, 2026 at 17:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or upgrade to a newer docuForm version once the issue is fixed.
  • Implement server‑side input validation and escaping for any parameters used in dfm‑menu_coveragealerts.php to sanitize injected values.
  • Deploy web application firewall rules or content security policies to detect and block reflected XSS payloads.

Generated by OpenCVE AI on May 11, 2026 at 17:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 17:45:00 +0000

Type Values Removed Values Added
Title Reflected XSS in docuForm’s dfm‑menu_coveragealerts.php
Weaknesses CWE-79

Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripted (XSS) vulnerability in the dfm-menu_coveragealerts.php component of GmbH Mecury Managed Print Services (docuForm) v11.11c allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into an unfiltered variable value.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-11T15:10:44.421Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61306

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T16:17:27.857

Modified: 2026-05-11T16:17:27.857

Link: CVE-2025-61306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T17:30:15Z

Weaknesses