# Exploit Title: Alkacon OpenCMS 15.0 - Multiple Cross-Site Scripting # Date: 1/07/2023 # Exploit Author: tmrswrr # Vendor Homepage: http://www.opencms.org # Software Link: https://github.com/alkacon/opencms-core # Version: v15.0 POC: 1 ) Login in demo page , go to this url https://demo.opencms.org/workplace#!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/.galleries/livedemo/!! 2 ) Click /.galleries/ , after right click any png file , open gallery, write in search button this payload 3 ) You will be see alert box POC: 1 ) Go to this url , right click any png file, rename title section and write your payload : https://demo.opencms.org/workplace#!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/230701/ld_go87op3bfy/.galleries/images/!! 2 ) You will be see alert box , stored xss POC: 1 ) Go to this url , right click any png file and choose replace , click change file and choose your svg file after save it svg file: 2 ) When click this svg file you will be see alert button