RiteCMS 3.0.0 - Reflected Cross Site Scripting (XSS)

EDB-ID:

52413




Platform:

Multiple

Date:

2025-08-18


# Exploit Title: RiteCMS 3.0.0 – Reflected Cross-Site Scripting (XSS)
# Google Dork: N/A
# Date: 2024-08-12
# Exploit Author: GURJOT SINGH
# Vendor Homepage: https://ritecms.com/
# Software Link: https://github.com/handylulu/RiteCMS/releases/download/V3.0.0/ritecms.v3.0.0.zip
# Version: <= 3.0.0
# Tested on: Ubuntu 22.04 LTS, PHP 8.1, Apache 2.4
# CVE: CVE-2024-28623

## Description:
A reflected Cross-Site Scripting (XSS) vulnerability exists in RiteCMS v3.0.0 within the `main_menu/edit_section` parameter. 
An attacker can inject arbitrary JavaScript code that will execute in the context of the victim's browser session.

## Impact:
- Theft of credentials or session tokens
- Phishing or malicious redirection
- Full control over the victim’s active browser session

## Proof of Concept (PoC):

Payload:
'"><svg/onload=confirm(/xsss/)>

Steps:
1. Log in or navigate to the vulnerable `main_menu/edit_section` functionality.
2. Inject the above payload into the vulnerable parameter.
3. Observe the execution of the injected JavaScript.

Video PoC:
https://github.com/GURJOTEXPERT/ritecms/blob/main/POC.mp4

Full write-up & repository:
https://github.com/GURJOTEXPERT/ritecms

## Mitigation:
- Implement strict input validation and output encoding.
- Enforce a Content Security Policy (CSP) to limit script execution.
- Update RiteCMS to a patched version when available.