关联漏洞
描述
This is a EXP For CVE-2025-57576. PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site > Scripting (XSS) in /admin/updateorder.php
介绍
# Descrip
PHPGurukul Online Shopping Portal 2.1 is vulnerable to Cross Site Scripting (XSS) in /admin/updateorder.php.
# Vulnerability Overview
1.Vulnerability Type: Stored Cross-Site Scripting (XSS)
2.Affected Product: Online Shopping Portal Project - 2.1
3.Affected Component: /shopping/admin/updateorder.php?oid=0
4.Attack Type: Stored Cross-Site Scripting (XSS)
# Steps to Reproduce
1.Set Up the Application : Install and configure the vulnerable version (v2.1) on a local server. download from here
``https://phpgurukul.com/shopping-portal-free-download/``

2.Login to the System : Use the default credentials provided by phpgurukul.
``admin/Test@123``
3.Access the Vulnerable Functionality : /shopping/admin/updateorder.php?oid=0

4.paste the below code into content and choose the Status 'In Process' then click update
``<script>alert(1)</script>``



5. Repeat into /shopping/admin/updateorder.php?oid=0 for a Stored Cross-Site Scripting (XSS)
# Link
``https://phpgurukul.com/shopping-portal-free-download/``
文件快照
[4.0K] /data/pocs/35a566d6dbc5d1576e602d552acec05b71367df6
├── [ 27K] 11.png
├── [ 39K] 22.png
├── [ 47K] 33.png
├── [ 57K] 44.png
├── [ 55K] 55.png
├── [ 20M] Online-Shopping-Portal-project-V2.0.part1.rar
├── [ 10M] Online-Shopping-Portal-project-V2.0.part2.rar
└── [1.1K] README.md
0 directories, 8 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。