This document details multiple web vulnerabilities in Zikula CMS v1.3.5, including persistent XSS in the 'real name' field and client-side XSS in the login and display path parameters. It provides technical descriptions, affected modules, and proof-of-concept examples but does not include functional exploit code.
Classification
Writeup 95%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:Zikula CMS v1.3.5
Auth required
Prerequisites:Low-privileged user account for persistent XSS · No authentication required for client-side XSS