Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-46041 PoC — Anchor CMS 安全漏洞

Source
Associated Vulnerability
Title:Anchor CMS 安全漏洞 (CVE-2025-46041)
Description:A stored cross-site scripting (XSS) vulnerability in Anchor CMS v0.12.7 allows attackers to inject malicious JavaScript via the page description field in the page creation interface (/admin/pages/add).
Readme
# Anchor CMS v0.12.7 - Stored XSS (CVE-2025-46041)

Anchor CMS v0.12.7 is vulnerable to a **Stored Cross-Site Scripting (XSS)** vulnerability in the `description` field of the `/admin/pages/add` interface.

## CVE ID

[CVE-2025-46041](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46041)

## Summary

* **Type:** Stored XSS
* **Location:** Page creation interface (`/admin/pages/add`)
* **Impact:** Arbitrary JavaScript execution
* **Authentication Required:** Yes (admin or editor user)
* **Affected Version:** Anchor CMS v0.12.7 (latest stable at time of discovery)

## Proof of Concept

1. Login to `/admin`
2. Go to `Pages > Add Page`
3. In the `Description` field, insert:

   ```html
   <script>alert(document.domain)</script>
   ```
4. Save the page.
5. Revisit the page view — the payload executes.

## Affected Component

* File: `anchor/routes/pages.php`
* Field: `description`

## Tested On

* Ubuntu 22.04
* Apache2 + PHP 8.1
* Anchor CMS v0.12.7 (fresh install)

## Discoverer

[@binneko](https://github.com/binneko)

## References

* [Anchor CMS GitHub](https://github.com/anchorcms/anchor-cms)
* [CVE Record - CVE-2025-46041](https://cve.mitre.org)

## Disclaimer

For educational and defensive purposes only.

File Snapshot

[4.0K] /data/pocs/0fe57b728b513289b66598af9fb2e7e594a8ce01 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →