Step 1: Authentication: The attacker must first authenticate to the Seo Panel application, likely by obtaining valid credentials or exploiting another vulnerability.
Step 2: Payload Injection: The attacker crafts a malicious JavaScript payload (e.g., <script>alert('XSS')</script>) and injects it into the url parameter when creating or modifying a website entry via the seo/seopanel/websites.php URI.
Step 3: Payload Storage: The application stores the injected payload in the database, without proper sanitization.
Step 4: Victim Interaction: A legitimate user, with appropriate permissions, views the website information, which includes the attacker-controlled url parameter.
Step 5: Payload Execution: The browser renders the stored url parameter, executing the malicious JavaScript payload within the user's browser context.