CVE-2026-36358 PoC - Juzaweb CMS v.5.0.0(XSS)

CVE-2026-36358 PoC - Juzaweb CMS v.5.0.0 (XSS)

漏洞描述:

Juzaweb CMS 5.0.0 版本在 /admin/banner-ads 组件中存在存储型跨站脚本(XSS)漏洞。已认证的管理员可以将任意 JavaScript 代码注入到“HTML”类型的广告内容(Body)中。当任何用户(包括未认证的访客)访问网站首页时,该恶意脚本将在其浏览器中执行。

受影响产品: Juzaweb CMS
受影响版本: 5.0.0
漏洞类型: 存储型跨站脚本(XSS)

漏洞验证(PoC):

首先是正常搭建和注册平台,这里我注册的管理员账密为123@123.com/123456 搭建好平台后可以看到网站页面image-20260507215019721访问/admin并登录

image-20260507215034805 登录后即可进入admin后台管理

image-20260507215044170 访问/admin/banner-ads路由,点击添加Add Banner进入创建广告页面 image-20260507215055819 Type改为HTML格式,Body填入恶意XSS代码 image-20260507215133105如果提示这样的错误

image-20260507215141483

请返回Image Type在URL那一栏随便填一个url image-20260507220445075 完成添加之后可以看到正在运行 image-20260507220451705 这时候返回主页就可以看到弹窗 image-20260507220457727

参考链接:

Description:

Juzaweb CMS version 5.0.0 is vulnerable to Stored Cross-Site Scripting (XSS) in the ‘/admin/banner-ads’ component. An authenticated administrator can inject arbitrary JavaScript code into the “HTML” banner ad body. When any user (including non-authenticated visitors) accesses the homepage, the malicious script will be executed in their browser.

Affected Product: Juzaweb CMS Affected Version: 5.0.0 Vulnerability Type: Stored Cross-Site Scripting (XSS)

Proof of Concept (PoC):

First, set up the platform normally and register an account. Here, the administrator account I registered is 123@123.com / 123456.

After setting up the platform, you can see the website homepage.

image-20260507220655680

Access /admin and log in.

image-20260507220702462

After logging in, you will enter the admin backend dashboard.

image-20260507220709931

Navigate to the /admin/banner-ads route and click “Add Banner” to go to the ad creation page.

image-20260507220718462

Change the Type to “HTML” and insert the malicious XSS code into the Body field.

image-20260507220726176

If you encounter an error like this:

image-20260507220732979

Go back to the “Image” Type and enter any URL in the URL field.

image-20260507220740424

After successfully adding the ad, you can see it is active/running.

image-20260507220745771

Now, return to the homepage. The alert box will pop up, demonstrating the XSS vulnerability.

image-20260507220749334

Reference:


CVE-2026-36358 PoC - Juzaweb CMS v.5.0.0(XSS)
http://example.com/2026/05/07/CVE-2026-36358/
作者
yuhua
发布于
2026年5月7日
许可协议