RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Main Menu - Items in the Administration Menu# Rite CMS v3.0 Multiple Stored XSS
## Author: (Sergio)
**Description:** Rite CMS 3.0 is affected by a Multiple Cross-Site scripting (XSS) stored vulnerability that allows attackers to execute arbitrary code via a crafted payload i to the Main Menu - Items in the Administration Menu.
**Attack Vectors:** AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
---
### POC:
When logging into the panel, we will go to the "Administration - Menus - Main Menu" section.
We click on Add item button and we add the XSS payloads to the Name, Title, Link and Accesskey fields.

### XSS Payload:
```js
'"><svg/onload=propmt('Name')>
```
In the following images you can see the embedded code that executes the payload in the main web.




</br>
[4.0K] /data/pocs/fb765b8e03ca57ae6a30679d420b823ff61ca032
└── [1.4K] README.md
0 directories, 1 file