Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-28073 PoC — phpList 安全漏洞

Source
Associated Vulnerability
Title:phpList 安全漏洞 (CVE-2025-28073)
Description:phpList before 3.6.15 is vulnerable to Reflected Cross-Site Scripting (XSS) via the /lists/dl.php endpoint. An attacker can inject arbitrary JavaScript code by manipulating the id parameter, which is improperly sanitized.
Readme
# CVE-2025-28073
[Suggested description]
phpList 3.6.3 is vulnerable to Reflected Cross-Site Scripting (XSS) via
the /lists/dl.php endpoint. An attacker can inject arbitrary JavaScript
code by manipulating the id parameter, which is improperly sanitized.

------------------------------------------

[Vulnerability Type]
Cross Site Scripting (XSS)

------------------------------------------

[Vendor of Product]
phpList

------------------------------------------

[Affected Product Code Base]
phpList - 3.6.15 (and possibly earlier versions)

------------------------------------------

[Affected Component]
phpList /lists/dl.php, phpList 3.6.15 (and possibly earlier versions)

------------------------------------------

[Attack Type]
Remote

------------------------------------------

[CVE Impact Other]
Session Hijacking, Credential Theft, Phishing Attacks, Arbitrary JavaScript Execution

------------------------------------------

[Attack Vectors]
This vulnerability is exploitable via a crafted URL containing malicious JavaScript code. A remote attacker can trick a victim into clicking a specially crafted link containing an XSS payload. When the victim accesses the vulnerable /lists/dl.php endpoint, the payload executes in their browser context. This may allow the attacker to steal session cookies, perform actions on behalf of the victim, or inject malicious content into the affected phpList instance.

------------------------------------------

[Reference]

https://github.com/phpList/phplist3

https://cve.mitre.org

https://www.exploit-db.com

------------------------------------------

[Discoverer]
Pattharadech Soponrat
File Snapshot

[4.0K] /data/pocs/b7061f91ce9ddd1008344ab89b301f2a85b5bdc8 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →