Vulnerability Description
A vulnerability in the XiaozhangBang Voluntary Like System V8.8 allows remote attackers to manipulate the zhekou parameter in the /topfirst.php Pay module, enabling unauthorized discounts. By sending a crafted HTTP POST request with zhekou set to an abnormally low value, an attacker can purchase votes at a reduced cost. Furthermore, by modifying the zid parameter, attackers can influence purchases made by other users, amplifying the impact. This issue stems from insufficient server-side validation of these parameters, potentially leading to economic loss and unfair manipulation of vote counts.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xiaozhangbang | Voluntary Like System | 8.8 |
Related Weaknesses (CWE)
References
- https://github.com/GoogTech/CVE/blob/master/Incorrect%20Access%20Control/IncorreExploitThird Party Advisory
- https://github.com/GoogTech/CVE/blob/master/Incorrect-Access-Control-in-XiaozhanExploitThird Party Advisory
FAQ
What is CVE-2025-60784?
CVE-2025-60784 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A vulnerability in the XiaozhangBang Voluntary Like System V8.8 allows remote attackers to manipulate the zhekou parameter in the /topfirst.php Pay module, enabling unauthorized discounts. By sending ...
How severe is CVE-2025-60784?
CVE-2025-60784 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-60784?
Check the references section above for vendor advisories and patch information. Affected products include: Xiaozhangbang Voluntary Like System.