CVE-2025-10366

Source
https://cve.org/CVERecord?id=CVE-2025-10366
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-10366.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-10366
Published
2025-09-13T14:15:31.100Z
Modified
2026-04-10T05:20:26.792244Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A flaw has been found in MiczFlor RPi-Jukebox-RFID up to 2.8.0. Affected is an unknown function of the file /htdocs/inc.setWlanIpMail.php. This manipulation of the argument Email address causes cross site scripting. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

References

Affected packages

Git / github.com/miczflor/rpi-jukebox-rfid

Affected ranges

Type
GIT
Repo
https://github.com/miczflor/rpi-jukebox-rfid
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "2.8.0"
        }
    ]
}

Affected versions

0.*
0.9.1
V2.*
V2.3.0
V2.4.0
v0.*
v0.9
v0.9.2
v0.9.3
v0.9.4
v0.9.5
v0.9.6
v0.9.7
Other
v1
v1.*
v1.0.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4
v1.1.6
v1.1.7
v1.1.8
v1.1.9
v2.*
v2.0.0
v2.1.0
v2.1.1
v2.2.0
v2.5.0
v2.6.0
v2.7.0
v2.8.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-10366.json"