Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| macrozheng | mall | 1.0.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A repository containing a PoC exploit for CVE‑2025‑8191 in Swagger UI, leveraging XSS injection to exfiltrate session cookies. | https://github.com/byteReaper77/CVE-2025-8191 | POC Details |
| 2 | Swagger UI versions 3.14.1 through 3.37.x are vulnerable to DOM-based Cross-Site Scripting (XSS) attacks. The vulnerability occurs when processing malicious configuration URLs that contain XSS payloads in the Swagger specification. An attacker can craft a malicious configUrl parameter that, when processed by Swagger UI, executes arbitrary JavaScript code in the victim's browser context. | https://github.com/projectdiscovery/nuclei-templates/blob/main/headless/cves/2025/CVE-2025-8191.yaml | POC Details |
| 3 | XSS Test Swagger 3.14.1 to 3.37.0 | https://github.com/mayank-s16/Swagger-HTML-Injection-CVE-2025-8191 | POC Details |
| 4 | None | https://github.com/YanC1e/CVE-2025-8191 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet