Description
A reflected cross-site scripted (XSS) vulnerability in the dfm-menu_departments.php component of GmbH Mecury Managed Print Services (docuForm) v11.11c allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into an unfiltered variable value.
Published: 2026-05-11
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A reflected cross‑site scripting vulnerability was discovered in the dfm‑menu_departments.php component of GmbH Mecury Managed Print Services (docuForm) version 11.11c. The flaw results from an unfiltered variable value being returned directly to the client, enabling an attacker to inject arbitrary JavaScript. If an affected user visits a crafted URL or otherwise provides the malicious input, the script executes in the browser, potentially compromising session credentials, defacing pages or performing actions on the user’s behalf.

Affected Systems

The vulnerability affects the GmbH Mecury Managed Print Services product, specifically the docuForm management application version 11.11c. It appears in the dfm‑menu_departments.php code path and has not been reported in earlier releases. Users running this version on internal networks or exposing the application to customers are at risk.

Risk and Exploitability

The flaw is client‑side and does not require authentication; an attacker can supply a malicious payload in a URL or form field that is reflected back to the user. According to the CVSS score of 6.1, the vulnerability presents a moderate severity risk. The lack of EPSS data means the precise exploitation probability is unknown, but reflected XSS is generally straightforward to deploy via phishing or compromised content. The vulnerability is not listed in the CISA KEV catalog, indicating no confirmed public exploitation yet, yet the impact on confidentiality, integrity and availability of user sessions can be significant.

Generated by OpenCVE AI on May 11, 2026 at 23:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑supplied patch or upgrade to a docuForm version that removes the unfiltered variable reference in dfm‑menu_departments.php.
  • If a patch is unavailable, implement server‑side input validation or output‑encoding for the affected parameter to neutralize injected scripts.
  • As a temporary workaround, restrict external access to dfm‑menu_departments.php or block the specific URL until the fix is deployed.

Generated by OpenCVE AI on May 11, 2026 at 23:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Docuform
Docuform docuform
Vendors & Products Docuform
Docuform docuform

Mon, 11 May 2026 23:30:00 +0000

Type Values Removed Values Added
Title Reflected XSS in dfm‑menu_departments.php of docuForm v11.11c

Mon, 11 May 2026 21:00:00 +0000

Type Values Removed Values Added
Title Reflected Cross‑Site Scripting in docuForm v11.11c
Weaknesses CWE-80

Mon, 11 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:00:00 +0000

Type Values Removed Values Added
Title Reflected Cross‑Site Scripting in docuForm v11.11c
Weaknesses CWE-79
CWE-80

Mon, 11 May 2026 15:30:00 +0000

Type Values Removed Values Added
Description A reflected cross-site scripted (XSS) vulnerability in the dfm-menu_departments.php component of GmbH Mecury Managed Print Services (docuForm) v11.11c allows attackers to execute arbitrary Javascript in the context of a user's browser via injecting a crafted payload into an unfiltered variable value.
References

Subscriptions

Docuform Docuform
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-11T18:49:00.332Z

Reserved: 2025-09-26T00:00:00.000Z

Link: CVE-2025-61309

cve-icon Vulnrichment

Updated: 2026-05-11T18:48:56.381Z

cve-icon NVD

Status : Deferred

Published: 2026-05-11T16:17:28.207

Modified: 2026-05-12T15:05:31.120

Link: CVE-2025-61309

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T09:23:57Z

Weaknesses