Description
A weakness has been identified in technical-laohu mpay up to 1.2.4. The affected element is an unknown function of the component User Center. This manipulation of the argument Nickname causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Published: 2026-01-19
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

A weakness in the User Center component of technical‑laohu mpay allows an attacker to inject malicious code by manipulating the Nickname field, leading to cross‑site scripting. The injected script runs in the browser of any user who views the affected account, potentially enabling session hijacking, phishing, or defacement of the application. The vulnerability is categorized as CWE‑79 and may also involve command injection aspects identified as CWE‑94. The attack can be launched remotely and a public proof‑of‑concept exploit has already been released on multiple repositories.

Affected Systems

The affected product is technical‑laohu mpay version 1.2.4 and earlier. The weakness resides in the User Center module of that product. No other versions or products are listed as impacted.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity and the EPSS value of less than 1% suggests that the likelihood of exploitation is low at present. However, because a public exploit is available and the vector is remote, the risk to customer data and application integrity should not be underestimated. The vulnerability is not included in the CISA KEV catalog. The attack path involves submitting a specially crafted Nickname value through the user profile interface, which is then reflected unescaped into the user page.

Generated by OpenCVE AI on April 18, 2026 at 05:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor's security update for mpay that removes the unsanitized Nickname field or upgrades to a version newer than 1.2.4
  • Validate and escape all user‑supplied Nickname data before rendering it in the browser, using context‑appropriate encoding
  • Implement a Content Security Policy that restricts inline scripts and limits script sources, and consider blocking or logging attempts to submit invalid input

Generated by OpenCVE AI on April 18, 2026 at 05:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:technical-laohu:mpay:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Technical-laohu
Technical-laohu mpay
Vendors & Products Technical-laohu
Technical-laohu mpay

Mon, 19 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in technical-laohu mpay up to 1.2.4. The affected element is an unknown function of the component User Center. This manipulation of the argument Nickname causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.
Title technical-laohu mpay User Center cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Technical-laohu Mpay
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:45:12.920Z

Reserved: 2026-01-18T13:59:43.860Z

Link: CVE-2026-1151

cve-icon Vulnrichment

Updated: 2026-01-20T21:28:22.763Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T11:15:50.047

Modified: 2026-02-06T19:42:35.703

Link: CVE-2026-1151

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses