Impact
A reflected cross‑site scripting flaw exists in the Cover Image Handler of Xinhu Rainrock RockOA when the fengmian argument to rock_page_gong.php is manipulated. The injected script runs in the context of any user who views the affected page, potentially enabling session hijacking, defacement or phishing. The weakness is an input validation problem (CWE‑79) that could also allow arbitrary code injection (CWE‑94).
Affected Systems
The vulnerability affects the Xinhu Rainrock RockOA product, all releases up to and including version 2.7.1. The affected component is the rock_page_gong.php script within the Cover Image Handler. Any installation running these or earlier versions is potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.1 indicates a medium severity flaw, and the EPSS score of less than 1% suggests a very low but non‑zero probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker can trigger the flaw remotely via the web interface by sending a specially crafted fengmian parameter, and a public exploit has already been released.
OpenCVE Enrichment