关键信息提炼 漏洞类型: - Stored Cross-Site Scripting (XSS) 受影响软件及版本: - H3Blog v1.0 漏洞位置: - /admin/cms/material/add Endpoint through the parameter 漏洞成因: - The application fails to sanitize user input and does not apply proper output encoding when displaying the name field in HTML contexts. 影响: - An authenticated attacker with administrative privileges can inject arbitrary JavaScript code through the name parameter when uploading a new material (e.g., image, file). The malicious payload is permanently stored in the database and executed whenever the material list or management interface is rendered in the admin panel. 复现步骤: - Submit a POST request to /admin/cms/material/add with a multipart/form-data payload, embedding a script in the name field. HTTP请求示例: