Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stvs
Stvs provision |
|
| Vendors & Products |
Stvs
Stvs provision |
Fri, 02 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 31 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | STVS ProVision 5.9.10 contains a cross-site scripting vulnerability in the 'files' POST parameter that allows authenticated attackers to inject arbitrary HTML code. Attackers can exploit the unvalidated input to execute malicious scripts within a user's browser session in the context of the affected site. | |
| Title | STVS ProVision 5.9.10 Authenticated Reflected Cross-Site Scripting via Files Parameter | |
| Weaknesses | CWE-79 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-02T20:57:54.855Z
Reserved: 2025-12-07T20:10:09.803Z
Link: CVE-2021-47725
Updated: 2026-01-02T20:57:51.617Z
Status : Deferred
Published: 2025-12-31T19:15:41.743
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-47725
No data.
OpenCVE Enrichment
Updated: 2026-01-05T10:15:13Z