This exploit demonstrates a stored XSS and HTTP Response Splitting vulnerability in PyroCMS 2.1.1. It shows how malicious input to the 'title' and 'redirect_to' parameters can lead to arbitrary script execution and header injection.
Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:PyroCMS 2.1.1
Auth required
Prerequisites:Access to the admin panel or comment submission form · Valid CSRF token for authenticated requests