[webapps] Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
Anchor CMS 0.12.7 存在存储型 XSS 漏洞,攻击者可通过 `markdown` 字段注入 JavaScript 代码,在页面加载时执行恶意脚本,可能导致会话劫持或管理员权限滥用。 2025-6-15 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:26 收藏

# Exploit Title: Anchor CMS 0.12.7 - Stored Cross Site Scripting (XSS)
# Google Dork: inurl:"/admin/pages/add" "Anchor CMS"
# Date: 2025-06-08
# Exploit Author: /bin/neko
# Vendor Homepage: http://anchorcms.com
# Software Link: https://github.com/anchorcms/anchor-cms
# Version: 0.12.7
# Tested on: Ubuntu 22.04 + Apache2 + PHP 8.1
# CVE: CVE-2025-46041

# Description:
Anchor CMS v0.12.7 suffers from a stored Cross-Site Scripting (XSS) vulnerability
in the `markdown` field of the /admin/pages/add page.
An authenticated user with page creation privileges can inject arbitrary JavaScript,
which is stored and executed when the page is viewed.

# Steps to Reproduce:
1. Login to /admin
2. Navigate to Pages > Add Page
3. In the `Markdown` field, insert:
   <script>alert(document.domain)</script>
4. Save the page.
5. View the created page. The script executes.

# Impact:
- Arbitrary JavaScript execution
- Potential session hijacking or admin impersonation
            

文章来源: https://www.exploit-db.com/exploits/52327
如有侵权请联系:admin#unsafe.sh