Impact
A flaw in the update function of D_singlePage.php in YiFang CMS 2.0.5 allows an attacker to insert arbitrary script content into the Title field. The supplied script is rendered without proper sanitization, creating a client‑side injection vulnerability. The CVE description explicitly states that remote exploitation is possible and that public exploits have been released. The weakness is identified as CWE‑79 (unvalidated script inclusion) and CWE‑94 (execution of arbitrary code).
Affected Systems
The only version listed as vulnerable is YiFang CMS 2.0.5. Any installation that exposes the D_singlePage.php update endpoint may be impacted, regardless of the deployment context or user roles, as the vulnerability resides in the application logic that processes administrator input.
Risk and Exploitability
A CVSS score of 5.1 indicates medium severity, while an EPSS score of less than 1 % suggests that exploitation attempts are unlikely to be widespread at present. The vulnerability is not catalogued in the CISA KEV list, but the existence of publicly available exploits means that adversaries could craft and send malicious requests remotely to trigger the XSS. The attack surface is limited to HTTP requests containing a manipulated Title parameter; no local privilege or authentication escalation is required beyond access to the update API.
OpenCVE Enrichment