Cross-site Scripting (XSS) - Stored in zikula/core


Reported on

Aug 31st 2021

✍️ Description

Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites

🕵️‍♂️ Proof of Concept

// PoC.js
1- Go to -->
2- Go to Editor and link a test word with a link ( As mentionned in the picture attached )
3- Inject " javascript:alert(document.domain); " and click ok & Save the Block .
4 - Click view the Block to see it and Click the word you linked . You will get an alert . in my Case here i clicked the " Slack " word.

Go --> to View the block i've already edited . Click " Slack " word and you will get an alert.

** See this ( Attahced pics ) **

POC1 -->

POC2 -->

💥 Impact

\.. This vulnerability is capable of... steal user session , takeover user account , make redirect user to attacker controlled site ...//


We have contacted a member of the zikula/core team and are waiting to hear back 2 years ago
Axel Guckelsberger validated this vulnerability 2 years ago
0x9x has been awarded the disclosure bounty
The fix bounty is now up for grabs
Axel Guckelsberger marked this as fixed with commit 03d3af 2 years ago
The fix bounty has been dropped
This vulnerability will not receive a CVE
2 years ago


Thanks Axel , Appriciated .

to join this conversation