Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Page Layout# ZenarioCMS Stored XSS v.9.4.59197
## Author: (Sergio)
**Description:** Cross Site Scripting vulnerability in ZenarioCMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Page Layout.
**Attack Vectors:** Scripting a vulnerability in the sanitization of the entry in the Page Layout allows injecting JavaScript code that will be executed when the user accesses the web page.
---
### POC:
When logging into the panel, we will go to the "Layout - Page Layout off the Administration Menu.

We click on Edit Layout and add the following payload:
### XSS Payload:
```js
<img src=x:alert(alt) onerror=eval(src) alt='XSS Page Layout'>
```

In the following image you can see the embedded code that executes the payload in the main web.

</br>
### Additional Information:
https://zenar.io/
https://owasp.org/Top10/es/A03_2021-Injection/
[4.0K] /data/pocs/4ece1b7fa92eb96ead83cdf3a03b557c9d679fae
└── [1.2K] README.md
0 directories, 1 file