Wisenshop Cross Site Scripting
Wisenshop Cross Site Scripting
# Exploit Title: Wisenshop - Stored XSS
# Exploit Author: CraCkEr
# # Exploit Title: Wisenshop - Stored XSS
# Exploit Author: CraCkEr
# Date: 11-10-2025
# Author of Script: Wisencode Infotech
# Vendor: Wisencode Infotech
# Vendor Homepage: https://www.codester.com/items/53007/wisenshop-ecommerce-store-script
# Software Link: https://default-theme.wisenshop.com/
# Demo Link: https://default-theme.wisenshop.com/
# Tested on: Windows 11 Pro
# Impact: Manipulate the content of the site
# CWE: CWE-79 - CWE-94 - CWE-74
# VDB: VDB-329935
# CVE: CVE-2025-12264


## Description

Attacker can send to victim a link containing a malicious URL in an email or instant message
can perform a wide variety of actions, such as stealing the victim's session token or login credentials


## Steps to Reproduce the Stored XSS Vulnerability:

1. Register on the target website as a standard user.
2. Log in using your newly created credentials.
3. Navigate to the Profile page: https://default-theme.wisenshop.com/profile
4. Click on "Create a Support Ticket" to access the ticket submission form: https://default-theme.wisenshop.com/support-ticket/create
5. Fill in arbitrary values for Email and Subject, and inject a malicious XSS payload into the Message field.
6. Submit the support ticket.

7. Log in as an admin and navigate to the Support Tickets section in the backend panel: https://default-theme.wisenshop.com/backend/tickets
8. Upon viewing the submitted ticket, the XSS payload executes in the admin?s browser.



[-] Done
Social Media Share
About Contact Terms of Use Privacy Policy
© Khalil Shreateh — Cybersecurity Researcher & White-Hat Hacker — Palestine 🇵🇸
All content is for educational purposes only. Unauthorized use of any information on this site is strictly prohibited.