Looking for a fix? Check your Codebase security with multiple scanners from

Edit Report

Our sensors found this exploit at:

Below is a copy:

CMS Sekolahku - Indonesian School HTML Injection
# Exploit Title : CMS Sekolahku - Indonesian School HTML Injection
# Author : Xmall75
# Vendor Homepage :
# Date : 1 August 2020
# Tested on : Windows
# Dork :
intext:"Powered by"

# Payload :
<h1>HTML Injection by Xmall75</h1>

# Step :
I found that they have 2 templates. So there will be different page you can inject.
1. First, input your payload on search console.
2. If it isn't vulnerable, then go to comment section. Input your payload there.

# Demo :

# [email protected]

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.