Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21202 PoC — Windows Recovery Environment Agent Elevation of Privilege Vulnerability

Source
Associated Vulnerability
Title:Windows Recovery Environment Agent Elevation of Privilege Vulnerability (CVE-2025-21202)
Description:Windows Recovery Environment Agent Elevation of Privilege Vulnerability
Description
CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
Readme
# CVE-2025-21202-exploit
CVE-2025-12101 is a cross-site scripting (XSS) vulnerability impacting Citrix NetScaler ADC and Citrix NetScaler Gateway appliances when configured in certain roles (Gateway, AAA virtual server)
# CVE-2025-12101 – Reflected XSS Detection Tool  
![Python](https://img.shields.io/badge/Python-3.7%2B-blue)
![Status](https://img.shields.io/badge/Project-PoC-orange)
![Security](https://img.shields.io/badge/Security-Research%20Only-red)

A proof-of-concept Python tool for identifying reflected Cross-Site Scripting (XSS) in Citrix NetScaler ADC / Gateway appliances affected by **CVE-2025-12101**.

This script sends a crafted SAMLResponse payload via a raw POST request to `/cgi/logout` and analyzes the server's response for reflected JavaScript code.

---

## 🔥 Features

- 🔍 Detects reflection of `<script>alert(1)</script>`
- 📡 Sends raw HTTP request (no external libraries used)
- 🔐 Full HTTPS (SSL/TLS) support
- 🎨 Color-coded CLI output
- 🧪 Optional flag to display **final sent request** and **server response**
- ⚡ Fast — built only on the Python standard library

---

## 📦 Installation

Clone the repository:

```bash
git clone https://github.com/yourname/CVE-2025-12101-Scanner.git
cd CVE-2025-12101-Scanner
python3 CVE-2025-12101-Scanner.py -u <url> --show #to show the request and response

File Snapshot

[4.0K] /data/pocs/6a9a2018a088f135b8a3d857f9e7af557ec65238 ├── [4.0K] cve_2025_12101_exploit.py └── [1.3K] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →