Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-16172 PoC — LimeSurvey 跨站脚本漏洞

Source
Associated Vulnerability
Title:LimeSurvey 跨站脚本漏洞 (CVE-2019-16172)
Description:LimeSurvey before v3.17.14 allows stored XSS for escalating privileges from a low-privileged account to, for example, SuperAdmin. The attack uses a survey group in which the title contains JavaScript that is mishandled upon group deletion.
Description
The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability.
Readme
# CVE-2019-16172
The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability.


## CVE Descriptions
### CVE-2019-16172
Description: CVE-2019-16172 is a stored XSS vulnerability found in LimeSurvey versions prior to 3.17. The vulnerability arises due to improper validation of user inputs when creating survey groups. An attacker can exploit this vulnerability by submitting a specially crafted payload, which can be stored on the server and executed in the context of other users accessing the survey.

Impact: Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the application, leading to potential data exfiltration, session hijacking, and other malicious activities.

## Scanner Descriptions
### CVE-2019-16172 Scanner
The CVE-2019-16172 Scanner is designed to check LimeSurvey instances for the stored XSS vulnerability. It sends a crafted payload to the /admin/survey/group/create endpoint and evaluates the response to determine if the server is vulnerable.

## Usage:

### Command: python cve_2019_16172_scanner.py --url <target_url>
#### Options:
--url: Specify a single URL to scan.
--file: Provide a file with multiple URLs for batch scanning.
--timeout: Set the request timeout (default is 10 seconds).
--threads: Specify the number of parallel threads for scanning (default is 5).
--output: Save results to a specified output file.



### Follow Us on Telegram
Stay updated with the latest tools and hacking resources. Join our Telegram Channel by clicking the logo below:

[![Telegram](https://upload.wikimedia.org/wikipedia/commons/thumb/8/82/Telegram_logo.svg/240px-Telegram_logo.svg.png)](https://t.me/Trixsec)
File Snapshot

[4.0K] /data/pocs/4701c5c607500c81287dc86d99b2b1b6b10564ad ├── [3.4K] CVE-2019-16172.py ├── [ 34K] LICENSE └── [1.7K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →