This exploit demonstrates a stored XSS vulnerability in Esotalk CMS by injecting malicious JavaScript into a comment via a crafted URL payload. The payload triggers an alert when a user hovers over the injected image link.
Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:Esotalk CMS (version not specified)
Auth required
Prerequisites:User must be authenticated to post a comment · Victim must interact with the malicious payload (hover over the link)