PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-70060 Ymfe CVE debrief

CVE-2025-70060 is a medium-severity web application vulnerability mapped to CWE-79 (Improper Neutralization of Input During Web Page Generation) in YMFE yapi 1.12.0. The NVD record lists a CVSS 3.1 score of 5.4 with network attack vector, low attack complexity, no privileges required, and user interaction required. The cited impact is limited to low confidentiality and integrity, with no availability impact noted. Because the source record does not include a fixed version or remediation details, the safest interpretation is that operators of the affected yapi release should treat this as an XSS-class issue and follow vendor or upstream guidance before exposing the application to untrusted input or broad user access.

Vendor
Ymfe
Product
CVE-2025-70060
CVSS
MEDIUM 5.4
CISA KEV
Not listed in stored evidence
Original CVE published
2026-03-09
Original CVE updated
2026-05-10
Advisory published
2026-03-09
Advisory updated
2026-05-10

Who should care

Administrators, developers, and security teams responsible for YMFE yapi 1.12.0 deployments should review this issue. It is especially relevant where yapi is used by multiple users, exposed over the network, or processes user-supplied content in web pages.

Technical summary

The official NVD data ties CVE-2025-70060 to cpe:2.3:a:ymfe:yapi:1.12.0 and CWE-79. The CVSS vector is AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N, indicating a remotely reachable flaw that depends on user interaction and can affect confidentiality and integrity at a low level. The source corpus does not provide a proof of concept, exploit chain, affected endpoint details, or a confirmed patched release.

Defensive priority

Medium. The issue is publicly documented and remotely reachable, but the available record suggests limited impact and requires user interaction. Prioritize it for web-facing yapi deployments and environments that accept untrusted input.

Recommended defensive actions

  • Review the NVD and linked advisory/reference material for the latest remediation guidance.
  • Determine whether any deployed instance is running YMFE yapi 1.12.0 and inventory exposed instances.
  • Limit exposure of yapi to trusted networks and authenticated users until remediation is confirmed.
  • Apply the vendor or upstream fix once a patched release is identified in official guidance.
  • Validate any user-controlled content handling and review web-page generation paths for XSS hardening.

Evidence notes

Evidence in the supplied corpus comes from the official NVD modified record for CVE-2025-70060, which lists affected CPE cpe:2.3:a:ymfe:yapi:1.12.0:*:*:*:*:*:*:*, CWE-79 as the primary weakness, and CVSS v3.1 vector AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N. The record also includes references to a third-party advisory gist and the YMFE GitHub organization/project pages. No exploit details, affected component subpaths, or fixed-version information are present in the supplied source item.

Official resources

Publicly disclosed in the official NVD record on 2026-03-09 and last modified on 2026-05-10. This debrief uses only the supplied official and referenced source material.