Share
## https://sploitus.com/exploit?id=B34D36B5-F9B4-55C4-A00A-AAE2E32E28B1
# π‘οΈ CVE-2025-26529 Exploitability PoC β UNISA Exclusive
This repository contains a comprehensive **Proof-of-Concept (PoC)** scanner and exploitation framework targeting **CVE-2025-26529**, a critical XSS vulnerability in vulnerable Moodle instances.
This tool is designed specifically for **UNISAβs Moodle portal** (`https://mymodules.dtls.unisa.ac.za`) and must **only** be used under proper authorization and compliance with legal and institutional guidelines.
---
## β οΈ DISCLAIMER
> π΅ **Authorized Use Only**
> This PoC is intended **exclusively for authorized UNISA cyber incident response and audit teams**.
> Misuse of this tool may lead to **criminal prosecution**.
> Developed by **ScaryByte**, in collaboration with UNISA teams.
---
## π¨ CVE Details
* **CVE-ID:** CVE-2025-26529
* **Type:** Reflected and DOM-based Cross-Site Scripting (XSS)
* **Impact:** Credential theft, session hijack, clickjacking, remote JS injection
* **Affected Software:** Moodle-based e-learning systems (core and unpatched plugins)
* **Attack Vector:** User input passed unsanitized to HTML context on vulnerable query routes
---
## π§ Requirements
Ensure Python 3.10+ is installed. Use a **virtualenv** for best isolation.
```bash
sudo apt update && sudo apt install -y python3-pip chromium-driver
python3 -m venv venv-xss
source venv-xss/bin/activate
pip install -r requirements.txt
```
### `requirements.txt`
```txt
requests
beautifulsoup4
selenium
```
---
## π Features
* β
CVE-2025-26529 reflected XSS payload testing
* β
DOM-based XSS detection using `MutationObserver`
* β
Cookie extraction and session hijack simulation
* β
Clickjacking iframe PoC generation
* β
Admin panel exposure verification
* β
Selenium-based rendering of DOM-XSS payloads
---
## π Files
| File | Description |
| ----------------------- | ------------------------------------------ |
| `xss_checker.py` | Main PoC script |
| `clickjack_poc.html` | Generated iframe-based clickjacking attack |
| `dom_xss_poc.html` | DOM XSS PoC with MutationObserver listener |
| `cve2025_full_scan.log` | Full exploit scan log |
| `requirements.txt` | Python dependencies |
---
## π§² Usage
Run the scanner from an authorized Kali Linux instance:
```bash
python3 xss_checker.py
```
Expected output:
* Status of publicly exposed files
* Payload reflection confirmation
* Cookies sniffed via `Set-Cookie` headers
* Admin panel accessibility
* DOM XSS PoC auto-loaded in headless browser
---
## π§ͺ DOM XSS PoC Preview
```html
<script>
new MutationObserver((mutations) => {
alert("DOM XSS Detected: " + document.body.innerHTML);
}).observe(document.body, { childList: true, subtree: true });
</script>
```
---
## 𧬠Next Steps
* β
Validate PoC against staging and production environments.
* βΊ Extend to perform **authenticated session simulation**.
* π Integrate with **BurpSuite proxy** for full visibility.
---
## π Legal Notice
This tool is part of a **UNISA vulnerability verification mandate** for CVE-2025-26529.
You are **not authorized** to use this PoC on any domain **except `mymodules.dtls.unisa.ac.za`** unless explicitly permitted.
---
## π€ Credits
* π Maintained by [ScaryByte](https://scarybyte.online)
---