# Exploit Title: Multiple XSS Issues in boidcmsv2.0.1 # Date: 3/2024 # Exploit Author: Andrey Stoykov # Version: 2.0.1 # Tested on: Ubuntu 22.04 # Blog: http://msecureltd.blogspot.com XSS via SVG File Upload Steps to Reproduce: 1. Login with admin user 2. Visit "Media" page 3. Upload xss.svg 4. Click "View" and XSS payload will execute // xss.svg contents Reflected XSS: Steps to Reproduce: 1. Login as admin 2. Visit "Media" page 3. Click "Delete" and intercept the HTTP GET request 4. In "file" parameter add the payload "" 5. After forwarding the HTTP GET request a browser popup would surface Stored XSS: Steps to Reproduce: 1. Login as admin 2. Visit "Settings" page 3. Enter XSS payload in "Title", "Subtitle", "Footer" 4. Then visit the blog page