Description
A vulnerability was found in dameng100 muucmf 1.9.5.20260309. The impacted element is an unknown function of the file /admin/config/list.html. Performing a manipulation of the argument Name results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-26
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting allowing remote script execution
Action: Patch
AI Analysis

Impact

A reflected XSS vulnerability exists in the /admin/config/list.html page of dameng100 muucmf. By manipulating the Name argument in a URL, an attacker can inject JavaScript that is executed in the browser of any user who views the page. The description does not explicitly state the results of such script execution, but it is inferred that typical consequences of reflected XSS include session hijacking, defacement of web content, or other client‑side attacks.

Affected Systems

The affected product is dameng100 muucmf version 1.9.5.20260309. The vulnerability is located in an unknown function within the administrative configuration interface, meaning that only users who can access the /admin/config/list.html page can exploit it. The vendor was notified but did not issue a public resolution.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, yet public exploits have been released, indicating real world exploitation potential. The attack vector is remote and relies on a normal HTTP request to a publicly accessible page; an attacker can supply a crafted Name value in the query string to trigger the payload. This scenario is inferred from the nature of reflected XSS and the fact that the exploit can be initiated remotely.

Generated by OpenCVE AI on March 26, 2026 at 08:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor‑issued patch for dameng100 muucmf 1.9.5.20260309 or upgrade to a newer version if available
  • If a patch is not available, restrict access to /admin/config/list.html via firewall rules or IP whitelisting to trusted administrators
  • Implement input validation and output encoding or deploy a content‑security‑policy to mitigate reflected XSS in the web application

Generated by OpenCVE AI on March 26, 2026 at 08:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Dameng100
Dameng100 muucmf
Vendors & Products Dameng100
Dameng100 muucmf

Thu, 26 Mar 2026 07:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in dameng100 muucmf 1.9.5.20260309. The impacted element is an unknown function of the file /admin/config/list.html. Performing a manipulation of the argument Name results in cross site scripting. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title dameng100 muucmf list.html cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Dameng100 Muucmf
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-26T18:25:26.648Z

Reserved: 2026-03-25T14:51:32.809Z

Link: CVE-2026-4847

cve-icon Vulnrichment

Updated: 2026-03-26T18:25:23.533Z

cve-icon NVD

Status : Deferred

Published: 2026-03-26T07:16:20.807

Modified: 2026-04-24T16:35:20.070

Link: CVE-2026-4847

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:08:20Z

Weaknesses