The exploit demonstrates multiple vulnerabilities in Ajaxel CMS 8.0, including reflected XSS, SQL injection, local file disclosure, and a CSRF-based RCE via the settings_eval_tab endpoint. The PoC includes clear examples of malicious payloads and attack vectors.
Classification
Working Poc 90%
Attack Type
Rce | Sqli | Xss | Info Leak
Complexity
Trivial
Reliability
Reliable
Target:Ajaxel CMS 8.0 and below
No auth needed
Prerequisites:Network access to the target · Victim interaction for XSS/CSRF