# Exploit Title: Coastercms 5.8.18 - Stored XSS# Exploit Author: Hardik Solanki# Vendor Homepage: https://www.coastercms.org/# Software Link: https://www.coastercms.org/# Version: 5.8.18# Tested on Windows 10
XSS IMPACT:1: Steal the cookie
2: User redirection to a malicious website
Vulnerable Parameters: Edit Page tab
Steps to reproduce:1: Navigate to "http://localhost/admin/login"and log inwith
admin credentials.2:- Then after login navigates to "Page --> Homepage --> Our Blog"and
click on the edit page.3: Then add the payload "<script>alert(123)</script>"& Payload
"<h1>test</h1>",and cliock on update button. Saved succesfully.4: Now, click on "View live page"and it will redirect you to the live page
at "http://localhost/homepage/blog"and XSS will get stored and
trigger on the main home page