Three stored XSSes were found, and all of them have not been found before. And the first one is similar to the third one, but the first one is in post-edit page while the other in page-edit page.
Stored XSS 1:
In /MiniCMS/mc-admin/post-edit.php
Payload:<script>alert(document.domain)</script>
POC:
Go to the article edit page, input payload into the content box:
Use burpsuite and edit the payload(the frontstage will encode the payload):
Three stored XSSes were found, and all of them have not been found before. And the first one is similar to the third one, but the first one is in post-edit page while the other in page-edit page.
Stored XSS 1:
In /MiniCMS/mc-admin/post-edit.php
Payload:<script>alert(document.domain)</script>
POC:
Go to the article edit page, input payload into the content box:

Use burpsuite and edit the payload(the frontstage will encode the payload):

After that, tern to the article page:

Then you get the window popped with the domain:

Stored XSS 2:
In/MiniCMS/mc-admin/conf.php
Payload:<script>alert("2:"+document.domain)</script>
POC:
Enter config page

Upload the payload in comment

Then write an article and set the comment code into true and save

When someone is reading the article, awindowwillpopwiththedomain

Stored XSS 3:
Payload:<script>alert("3: "+document.domain)</script>
In /MiniCMS/mc-admin/page-edit.php
POC:
2.Use burpsuite to edit the payload. Pay attention that the “+” needs to be url-encoded:

3.After that, go to the page we have saved:

4.Window will pop with the domain:

The text was updated successfully, but these errors were encountered: