header-logo
Suggest Exploit
vendor:
Textpattern CMS
by:
Tushar Vaidya
8.8
CVSS
HIGH
Persistent Cross-Site Scripting (XSS)
79
CWE
Product Name: Textpattern CMS
Affected Version From: 4.9.0-dev
Affected Version To: 4.9.0-dev
Patch Exists: YES
Related CWE: N/A
CPE: a:textpattern:textpattern
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows
2021

Textpattern CMS 4.9.0-dev – ‘Excerpt’ Persistent Cross-Site Scripting (XSS)

Textpattern CMS 4.9.0-dev is vulnerable to a persistent cross-site scripting (XSS) vulnerability. An attacker can inject malicious JavaScript code into the 'Excerpt' field of the Textpattern CMS admin panel. When a user visits the 'articles' page, the malicious code will be executed in the user's browser.

Mitigation:

Users should ensure that they are running the latest version of Textpattern CMS and should not click on any suspicious links.
Source

Exploit-DB raw data:

# Exploit Title:  Textpattern CMS 4.9.0-dev - 'Excerpt' Persistent Cross-Site Scripting (XSS)
# Date: 2021-03-04
# Exploit Author: Tushar Vaidya
# Vendor Homepage: https://textpattern.com
# Software Link: https://textpattern.com/start
# Version: v 4.9.0-dev
# Tested on: Windows

Steps-To-Reproduce:
1. Login into Textpattern CMS admin panel.
2. Now go to the *Content > Write > ** Excerpt*.
3. Now paste the below payload in the URL field.

Ba1man”><img src=x onerror=confirm(document.cookie)>

4. Now click on the *Save* button.
5. Now go to the *articles* page
5. The XSS will be triggered.