2025-07-03
[email protected]
5.3
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Lifecycle Timeline
3
EUVD ID Assigned
Mar 16, 2026 - 02:12 euvd
EUVD-2025-19846
Analysis Generated
Mar 16, 2026 - 02:12 vuln.today
CVE Published
Jul 03, 2025 - 12:15 nvd
MEDIUM 5.3
Description
The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript.
Analysis
A remote code execution vulnerability in HttpOnly flag (CVSS 5.3). Remediation should follow standard vulnerability management procedures.
Technical Context
Vulnerability type: remote code execution. Affects HttpOnly flag.
Affected Products
['HttpOnly flag']
Remediation
Monitor vendor channels for patch availability.
Priority Score
27
Low
Medium
High
Critical
KEV: 0
EPSS: +0.1
CVSS: +26
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).
EUVD-2025-19846