<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Xwiki_CMS_12.10.2_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>Xwiki CMS 12.10.2 XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Xwiki_CMS_12.10.2_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Xwiki_CMS_12.10.2_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-20T23:35:45Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Xwiki_CMS_12.10.2_XSS%E6%BC%8F%E6%B4%9E&amp;diff=1298&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==XSS== &lt;pre&gt; # Exploit Title: Xwiki CMS 12.10.2 - Cross Site Scripting (XSS) # Date: 17-01-2021 # Exploit Author: Karan Keswani # Vendor Homepage: https://www.xwiki.org/xwiki...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Xwiki_CMS_12.10.2_XSS%E6%BC%8F%E6%B4%9E&amp;diff=1298&amp;oldid=prev"/>
		<updated>2021-04-09T08:17:04Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==XSS== &amp;lt;pre&amp;gt; # Exploit Title: Xwiki CMS 12.10.2 - Cross Site Scripting (XSS) # Date: 17-01-2021 # Exploit Author: Karan Keswani # Vendor Homepage: https://www.xwiki.org/xwiki...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Xwiki CMS 12.10.2 - Cross Site Scripting (XSS)&lt;br /&gt;
# Date: 17-01-2021&lt;br /&gt;
# Exploit Author: Karan Keswani&lt;br /&gt;
# Vendor Homepage: https://www.xwiki.org/xwiki/bin/view/Main/WebHome&lt;br /&gt;
# Software Link: https://www.xwiki.org/xwiki/bin/view/Download/&lt;br /&gt;
# Version: Xwiki CMS- 12.10.2&lt;br /&gt;
# Tested on: Windows 10&lt;br /&gt;
&lt;br /&gt;
# Description: XWiki 12.10.2 allows XSS via an SVG document to the upload feature of the comment section.&lt;br /&gt;
&lt;br /&gt;
# Additional Information:&lt;br /&gt;
Well I found this vulnerability in Xwiki project based websites but they did not respond so i installed a latest version of Xwiki CMS and hosted on localhost with help of Wamp and then i exploited that vulnerability.&lt;br /&gt;
&lt;br /&gt;
# Attack Vector:&lt;br /&gt;
1) Create 2 accounts:- 1)Victim &amp;amp; 2)Attacker&lt;br /&gt;
2) Login with victim account, there is a option to create new dashboard and there is page says give title and type.( Type of Dashboard:-I created simple page)&lt;br /&gt;
3) Now save view the page,&lt;br /&gt;
4) Now login with attacker account and search and open the dashboard which has been created by victim,&lt;br /&gt;
5) When you open the dashboard there is a comment section option, Go to that comment section &amp;amp; add a comment,there is a upload functionality,&lt;br /&gt;
6) So i tried to upload a sample svg file to check that it will allow to upload .svg format&lt;br /&gt;
7) Now i created a text file with XSS payload and then saved it as a .svg format&lt;br /&gt;
8) Upload your .svg file and click on send it to the server and click ok (your comment will be add)&lt;br /&gt;
9) Now open that comment with the victim account and click on that view image you'll see the xss pop-up.&lt;br /&gt;
&lt;br /&gt;
Xss Payload:-&lt;br /&gt;
&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot; standalone=&amp;quot;yes&amp;quot;?&amp;gt;&lt;br /&gt;
&amp;lt;svg&lt;br /&gt;
&lt;br /&gt;
onload=&amp;quot;alert('xss')&amp;quot;&lt;br /&gt;
 xmlns=&amp;quot;http://www.w3.org/2000/svg&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/svg&amp;gt;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>