header-logo
Suggest Exploit
vendor:
Plone CMS
by:
Piyush Patil
8.8
CVSS
HIGH
Stored XSS
79
CWE
Product Name: Plone CMS
Affected Version From: 5.2.3
Affected Version To: 5.2.3
Patch Exists: YES
Related CWE: None
CPE: a:plone:plone:5.2.3
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2021

Plone CMS 5.2.3 – ‘Title’ Stored XSS

Plone CMS 5.2.3 is vulnerable to stored XSS. An attacker can inject malicious JavaScript code in the 'Title' field of the Site Setup page. When a user visits the page, the malicious code is executed in the user's browser.

Mitigation:

The vendor has released a patch to address this vulnerability. It is recommended to upgrade to the latest version of Plone CMS.
Source

Exploit-DB raw data:

# Exploit Title: Plone CMS 5.2.3 - 'Title' Stored XSS
# Date: 18-03-2021
# Exploit Author: Piyush Patil
# Vendor Homepage: https://plone.com/
# Software Link: https://github.com/plone/Products.CMFPlone/tags
# Version: 5.2.3
# Tested on: Windows 10


# Reference - https://github.com/plone/Products.CMFPlone/issues/3255

Steps to reproduce the issue:
1- Goto https://localhost/ where Plone 5.2.3 version is installed.
2- Click on "Log in now" and Login as "Manager"
3- Navigate to Manager=>Site Setup=>Site
4- Edit "Site title" field to "xyz<ScRiPt>alert(1)</ScRiPt>"