{"uuid": "99d30831-376d-4f2a-bcb0-064c2bb02ddd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-11564", "type": "published-proof-of-concept", "source": "https://t.me/arpsyndicate/4876", "content": "#ExploitObserverAlert\n\nCVE-2018-11564\n\nDESCRIPTION: Exploit Observer has 11 entries in 4 file formats related to CVE-2018-11564. Stored XSS in YOOtheme Pagekit 1.0.13 and earlier allows a user to upload malicious code via the picture upload feature. A user with elevated privileges could upload a photo to the system in an SVG format. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to \"/storage/poc.svg\" that will point to http://localhost/pagekit/storage/poc.svg. When a user comes along to click that link, it will trigger a XSS attack.\n\nFIRST-EPSS: 0.001790000\nNVD-IS: 2.7\nNVD-ES: 1.7\nARPS-PRIORITY: 0.8538082", "creation_timestamp": "2024-04-25T22:03:01.000000Z"}