exploitdb
WORKING POC
by Yesith Alvarez · pythonremotemultiple
https://www.exploit-db.com/exploits/52401
This exploit targets a memory disclosure vulnerability in Citrix NetScaler ADC/Gateway 14.1 (CVE-2025-5777) by sending a crafted POST request to '/p/u/doAuthentication.do' and extracting sensitive data from the response. The exploit captures and displays leaked memory content in hexadecimal format.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway 14.1
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler ADC/Gateway instance
nomisec
WORKING POC
45 stars
by win3zz · infoleak
https://github.com/win3zz/CVE-2025-5777
This repository contains a functional proof-of-concept exploit for CVE-2025-5777, a memory leak vulnerability in Citrix NetScaler appliances. The exploit sends malformed POST requests to leak uninitialized memory content, which may include sensitive data like session tokens or credentials.
Classification
Working Poc 95%
Target:
Citrix NetScaler
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler appliance · Python 3.x with aiohttp and colorama libraries
nomisec
WORKING POC
30 stars
by bughuntar · infoleak
https://github.com/bughuntar/CVE-2025-5777
This repository contains a functional proof-of-concept exploit for CVE-2025-5777, a memory leak vulnerability in Citrix NetScaler ADC/Gateway devices. The exploit sends malformed authentication requests to trigger memory disclosure, parsing leaked content from XML responses.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway
No auth needed
Prerequisites:
Network access to vulnerable Citrix NetScaler instance · Python 3.8+ with aiohttp and beautifulsoup4 libraries
nomisec
WORKING POC
17 stars
by mingshenhk · poc
https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-
This repository contains a proof-of-concept exploit for CVE-2025-5777, an out-of-bounds memory read vulnerability in Citrix NetScaler ADC/Gateway. The exploit leverages an overly long Host header to trigger memory leakage, potentially exposing session cookies and other sensitive data.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway (versions < 14.1-43.56, < 13.1-58.32, and others)
No auth needed
Prerequisites:
Network access to the vulnerable Citrix NetScaler instance · The target must be configured as a Gateway or AAA virtual server
nomisec
SCANNER
7 stars
by Chocapikk · infoleak
https://github.com/Chocapikk/CVE-2025-5777
This repository contains a mass-scanner for CVE-2025-5777 (CitrixBleed 2), designed to detect vulnerable Citrix systems by sending multiple POST requests and analyzing responses for specific hex patterns indicative of session token leaks. It uses GNU parallel for concurrent scanning and includes optional OpenSSL configuration tweaks for compatibility.
Classification
Scanner 95%
Target:
Citrix Gateway (unspecified version)
No auth needed
Prerequisites:
GNU parallel · GNU getopt · curl · perl · hexdump · flock
nomisec
WORKING POC
4 stars
by soltanali0 · infoleak
https://github.com/soltanali0/CVE-2025-5777-Exploit
This repository contains a Python-based exploit for CVE-2025-5777, targeting Citrix NetScaler VPN to extract sensitive tokens, internal IPs, and hidden endpoint paths. The tool uses asynchronous requests to scan and analyze vulnerable endpoints.
Classification
Working Poc 90%
Target:
Citrix NetScaler VPN
No auth needed
Prerequisites:
Python 3.8+ · aiohttp library · target URL
nomisec
WORKING POC
3 stars
by ndr-repo · poc
https://github.com/ndr-repo/CVE-2025-5777
This exploit PoC targets CVE-2025-5777, a memory disclosure vulnerability in Citrix NetScaler Gateway & AAA Virtual Server. It leverages insufficient input validation and TOCTOU race conditions to scrape variables in memory, potentially leading to session cookie leakage.
Classification
Working Poc 90%
Target:
Citrix NetScaler Gateway & AAA Virtual Server
No auth needed
Prerequisites:
Target domain with vulnerable Citrix NetScaler instance
nomisec
WORKING POC
3 stars
by Shivshantp · poc
https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE
This repository contains a working PoC for CVE-2025-5777, an authentication bypass and RCE vulnerability in Trend Micro Apex Central. The exploit sends a crafted HTTP request to execute arbitrary commands with SYSTEM/root privileges.
Classification
Working Poc 90%
Target:
Trend Micro Apex Central (versions prior to Patch 2379)
No auth needed
Prerequisites:
Network access to the vulnerable Trend Micro Apex Central instance
nomisec
WORKING POC
3 stars
by nocerainfosec · infoleak
https://github.com/nocerainfosec/cve-2025-5777
This repository contains a functional PoC scanner for CVE-2025-5777, a memory disclosure vulnerability in Citrix NetScaler ADC and Gateway. The script sends crafted HTTP POST requests to trigger memory leaks and extracts sensitive data such as session cookies, tokens, and passwords.
Classification
Working Poc | Scanner 95%
Target:
Citrix NetScaler ADC and Gateway
No auth needed
Prerequisites:
Network access to the vulnerable Citrix endpoint · Python 3 environment
nomisec
WORKING POC
2 stars
by cyberleelawat · infoleak
https://github.com/cyberleelawat/ExploitVeer
This repository contains a functional PoC for CVE-2025-5777, a critical memory leak vulnerability in Citrix NetScaler ADC and Gateway. The script scans targets, extracts sensitive data like session cookies, and logs findings for analysis.
Classification
Working Poc | Scanner 95%
Target:
Citrix NetScaler ADC and Gateway
No auth needed
Prerequisites:
Network access to vulnerable Citrix NetScaler instance · Python 3.x with aiohttp and colorama libraries
nomisec
WORKING POC
2 stars
by orange0Mint · infoleak
https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777
This repository contains a proof-of-concept exploit for CVE-2025-5777, targeting Citrix ADC/Gateway. The scripts include a checker to identify vulnerable hosts and a PoC to dump memory contents, leveraging an authentication bypass vulnerability.
Classification
Working Poc 90%
Target:
Citrix ADC/Gateway
No auth needed
Prerequisites:
Network access to the target Citrix ADC/Gateway · Target must be vulnerable to CVE-2025-5777
nomisec
WORKING POC
1 stars
by RickGeex · poc
https://github.com/RickGeex/CVE-2025-5777-CitrixBleed
This repository contains a proof-of-concept exploit for CVE-2025-5777, an unauthenticated out-of-bounds read vulnerability in Citrix NetScaler ADC/Gateway. The exploit sends a minimal authentication request to extract memory contents between specific XML tags, potentially leaking session tokens.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway (versions before 14.1-43.56, 13.1-58.32, 13.1-FIPS 13.1-37.235, 12.1-FIPS 12.1-55.328)
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler ADC/Gateway · Target must be running a vulnerable version
nomisec
WORKING POC
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2025-5777
The repository contains a functional exploit for CVE-2025-5777, a memory disclosure vulnerability in Citrix NetScaler ADC/Gateway. The Python script sends crafted HTTP requests to leak sensitive memory contents, similar to the original CitrixBleed vulnerability.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler ADC/Gateway
nomisec
WORKING POC
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2025-5777
The repository contains a functional Python script that exploits CVE-2025-5777, a memory disclosure vulnerability in Citrix NetScaler ADC/Gateway. The exploit sends crafted HTTP requests to leak sensitive memory contents, including session tokens and authentication cookies.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler ADC/Gateway
nomisec
WORKING POC
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2025-5777
The repository contains a functional Python script that exploits CVE-2025-5777, a memory disclosure vulnerability in Citrix NetScaler ADC/Gateway. The exploit sends crafted HTTP requests to leak sensitive memory contents, including session tokens and authentication cookies.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler ADC/Gateway
nomisec
WORKING POC
by FrenzisRed · infoleak
https://github.com/FrenzisRed/CVE-2025-5777
This PowerShell script exploits CVE-2025-5777 by sending crafted POST requests to a vulnerable endpoint to leak sensitive data. It iteratively extracts and saves leaked content to a file, displaying progress in real-time.
Classification
Working Poc 90%
Target:
Unknown (endpoint suggests a web application with authentication)
No auth needed
Prerequisites:
Network access to the target endpoint · Vulnerable version of the target software
nomisec
WORKING POC
by rashedhasan090 · infoleak
https://github.com/rashedhasan090/CVE-2025-5777
This repository contains a functional exploit for CVE-2025-5777, a memory leak vulnerability in Citrix NetScaler appliances. The exploit sends malformed POST requests to leak uninitialized memory content, which may include session tokens, credentials, and other sensitive data.
Classification
Working Poc 95%
Target:
Citrix NetScaler
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler appliance · Python 3.x with aiohttp and colorama libraries
nomisec
WORKING POC
by Anshika2709 · poc
https://github.com/Anshika2709/Citrixbleed2-CVE-2025-5777
The repository contains a functional Python-based PoC for CVE-2025-5777, a memory leak vulnerability in Citrix NetScaler. The exploit sends crafted POST requests to extract sensitive memory contents via the <InitialValue> tag, demonstrating the vulnerability effectively.
Classification
Working Poc 95%
Target:
Citrix NetScaler
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler instance
nomisec
STUB
by mr-r3b00t · poc
https://github.com/mr-r3b00t/CVE-2025-5777
The repository contains only a placeholder README for CVE-2025-5777, labeled as 'CitrixBleed 2.0,' with no actual exploit code or technical details. It appears to be an early or incomplete placeholder for future content.
Target:
Citrix (version unspecified)
No auth needed
nomisec
WORKING POC
by rob0tstxt · infoleak
https://github.com/rob0tstxt/POC-CVE-2025-5777
This PoC exploits a memory leak vulnerability in Citrix NetScaler by sending POST requests to '/p/u/doAuthentication.do' and extracting sensitive data from the response. It uses asyncio for concurrent requests and checks for the presence of an 'InitialValue' tag in the response.
Classification
Working Poc 95%
Target:
Citrix NetScaler
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler instance
nomisec
WORKING POC
by rootxsushant · infoleak
https://github.com/rootxsushant/Citrix-NetScaler-Memory-Leak-CVE-2025-5777
This is a functional PoC for CVE-2025-5777, a memory leak vulnerability in Citrix NetScaler. It sends multiple POST requests to `/p/u/doAuthentication.do` to extract memory contents via the `<InitialValue>` tag.
Classification
Working Poc 95%
Target:
Citrix NetScaler
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler instance
nomisec
WRITEUP
by below0day · poc
https://github.com/below0day/Honeypot-Logs-CVE-2025-5777
This repository appears to be a writeup or documentation related to honeypot logs for CVE-2025-5777, which is associated with CitrixBleed 2 NetScaler. It does not contain exploit code or technical details of the vulnerability.
Classification
Writeup 90%
Target:
Citrix NetScaler (version not specified)
No auth needed
Prerequisites:
Access to honeypot logs
nomisec
WORKING POC
by SleepNotF0und · infoleak
https://github.com/SleepNotF0und/CVE-2025-5777
This PoC exploits an information leak vulnerability in Citrix Gateway by sending a crafted POST request to '/p/u/doAuthentication.do' and extracting sensitive data from the 'InitialValue' field in the XML response. It also attempts to trigger additional responses by sending 20 follow-up requests.
Classification
Working Poc 90%
Target:
Citrix Gateway (version not specified)
No auth needed
Prerequisites:
Network access to the target Citrix Gateway · Target endpoint '/p/u/doAuthentication.do' must be accessible
nomisec
WORKING POC
by 0xgh057r3c0n · infoleak
https://github.com/0xgh057r3c0n/CVE-2025-5777
This is a functional proof-of-concept exploit for CVE-2025-5777, a memory leak vulnerability in Citrix NetScaler ADC/Gateway appliances. It leverages asynchronous HTTP requests to trigger and extract sensitive memory fragments via the `/p/u/doAuthentication.do` endpoint.
Classification
Working Poc 95%
Target:
Citrix NetScaler ADC/Gateway
No auth needed
Prerequisites:
Network access to the target Citrix NetScaler appliance · Vulnerable endpoint `/p/u/doAuthentication.do`
nomisec
WORKING POC
by idobarel · infoleak
https://github.com/idobarel/CVE-2025-5777
This PoC exploits CVE-2025-5777, an OOB read vulnerability in Citrix Gateway's login process, to leak memory data. It uses multi-threaded requests to extract sensitive information like cookies or credentials.
Classification
Working Poc 95%
Target:
Citrix Gateway (unspecified version)
No auth needed
Prerequisites:
Vulnerable Citrix Gateway instance · Network access to the target
nomisec
SCANNER
by RaR1991 · infoleak
https://github.com/RaR1991/citrix_bleed_2
This repository contains a PoC scanner for CVE-2025-5777, a hypothetical vulnerability in Citrix ADC devices. The scanner sends oversized requests to detect memory leaks and extracts sensitive information using entropy analysis and regex patterns.
Classification
Scanner 90%
Target:
Citrix ADC
No auth needed
Prerequisites:
Network access to the target Citrix ADC device