This exploit demonstrates a stored XSS vulnerability in LUYA CMS 1.0.12 by injecting malicious JavaScript into the 'title' and 'description' fields of a page creation request. The payload triggers an alert dialog when rendered in the admin interface.
Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:LUYA CMS 1.0.12
Auth required
Prerequisites:Valid admin session (Bearer token, CSRF token, and cookies) · Access to the admin interface