RiteCMS 3.0 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up# RiteCMS 3.0 File Upload - XSS
## Author: (Sergio)
**Description:** File upload vulnerability in RiteCMS 3.0 allows a local attacker to upload a svg file with XSS content.
**Attack Vectors:** AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
---
### POC:
We create an svg file with the following content:
```js
<svg
onload="alert('xss attach')"
xmlns="http://www.w3.org/2000/svg">
</svg>
```
When logging into the panel, we will go to the "Filemanager" section off Administration Menu and click on Upload file.

Here we see the svg file uploaded correctly:

Then we open the file and the XSS pop-up appears

</br>
### Additional Information:
https://github.com/handylulu/RiteCMS/
[4.0K] /data/pocs/df32341c77af005ae9dfdd863b17c5bb156b870e
└── [1.1K] README.md
0 directories, 1 file