Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-33209 PoC — FlatPress 安全漏洞

Source
Associated Vulnerability
Title:FlatPress 安全漏洞 (CVE-2024-33209)
Description:FlatPress v1.3 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser.
Description
FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser.
Readme
# CVE-2024-33209
FlatPress 1.3. is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the "Add New Entry" section, which allows them to execute arbitrary code in the context of a victim's web browser.

Vulnerability Type:
Cross Site Scripting (XSS)

Vendor of Product :

flatpress CMS

Affected Product Code Base : 

Flatpress v1.3 - will be fixed in FlatPress version 1.3.

Affected Component

Add New Entry feature in admin panel

Attack Type:

Remote

Impact:
An attacker exploiting this vulnerability could inject malicious code into the FlatPress CMS, which could lead to various malicious activities such as stealing user session tokens, cookies, or other sensitive information. They can also modify the content of the webpage, redirect users to malicious websites, or perform actions on behalf of the victim.

Attack Vectors:

Attacker can send crafted link to victim.

Reference

https://owasp.org/www-community/attacks/xss/

Video POC:

https://drive.google.com/file/d/1AvPQszOimG8_zxiwoVnmeGGh8JY9J4IL/view

Discoverer:

Parag Bagul
File Snapshot

[4.0K] /data/pocs/5cd8ca8468634da695eec7bf16104b5f4eae384b └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →