Skip to content

GURJOTEXPERT/ritecms

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

12 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ CVE-2024-28623 – XSS Vulnerability in RiteCMS v3.0.0

πŸ” Overview

This repository documents a Cross-Site Scripting (XSS) vulnerability discovered in RiteCMS v3.0.0, which I reported and was assigned the CVE ID CVE-2024-28623.


πŸ“„ Vulnerability Details

  • CVE ID: CVE-2024-28623
  • Product: RiteCMS
  • Version Affected: v3.0.0
  • Vulnerability Type: Reflected Cross-Site Scripting (XSS)
  • Vulnerable Component: main_menu/edit_section
  • Status: Publicly disclosed on NVD

⚠️ Impact

The XSS vulnerability allows an attacker to execute arbitrary JavaScript in the victim’s browser, leading to:

  • Credential or session token theft
  • Phishing attacks via fake forms or redirects
  • Full control over the victim’s session (browser-based)
  • Potential privilege escalation (depending on context)

πŸ’₯ Proof of Concept (PoC)

πŸ”§ Payload

'"><svg/onload=confirm(/xsss/)>

This payload demonstrates a basic reflected XSS vector that triggers a JavaScript confirm() dialog when rendered unsanitized.


πŸ“Ή PoC Video Demonstration

POC.1.mp4

βœ… This video demonstrates how the XSS vulnerability in RiteCMS v3.0.0 is triggered using the payload.


πŸ›‘οΈ Mitigation Recommendations

  • βœ… Input Validation: Properly sanitize and encode all user input rendered in HTML.
  • βœ… Patch CMS: Upgrade to a patched version when available.
  • βœ… Security Headers: Implement CSP (Content Security Policy) to restrict script execution.
  • βœ… WAF: Use a Web Application Firewall to detect and block common XSS payloads.

πŸ‘¨β€πŸ’» Researcher Info

Discovered & Reported By: @GURJOTEXPERT
CVE Link: CVE-2024-28623
Contact: For questions or collaboration, open an issue or message via GitHub.


πŸ“¬ Disclaimer

This repository is published for educational and research purposes only. Do not attempt to exploit this vulnerability on systems you do not own or have explicit permission to test.

About

CROSS SITE SCRIPTING

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors