XVNA - Extreme Vulnerable Node Application

XNVA available in github. https://github.com/vegabird/xvna



XVNA is an extremely vulnerable node application coded in Nodejs(Expressjs)/MongoDB that helps security enthusiasts to learn application security. it’s not counseled to host this application online as it is intended to be Vulnerable. We tend to suggest hosting this application in a native setting and sharpening your application security skills with any tools of your own selection. It’s all legal to interrupt or hack into this. the concept is to evangelize application security to the community is probably the best and elementary method. Learn and acquire these skills permanently purpose. however, you utilize these skills and content isn’t our responsibility.


Extreme Vulnerable Node Application (XVNA) is most vulnerable, don’t transfer it to your hosting provider’s public folder or any net-facing servers, as they’ll be compromised. It is recommended to use the localhost.


We are not responsible for any loss after using this XVNA (Extreme Vulnerable Node Application). We are clearing that this is the malicious application, we are not responsible for any loss of yours. Installing it in the web server may compromise your security and data.


  • Start MongoDB
  • Create DB xvna in MongoDB
  • Import the Collection to MongoDB given from folder collection
  • Start the xvna from root folder using the command: node index.js
  • We are good to go, hit localhost:3000/app
  • Login Credential: email-> admin@xvna.com password -> password

List of Vulnerability

  • A1:2017-Injection
    1. OS Injection
    2. NoSQL Injection
    3. Server-side Js Injection
  • A2:2017-Broken Authentication
  • A3:2017-Sensitive Data Exposure
    1. Sensitive Data
    2. Headers
  • A6:2017-Security Misconfiguration
  • A7:2017-Cross-Site Scripting
  • A8:2017-Insecure Deserialization

You can view the tutorial about how to use our software https://youtu.be/jAOGlf4eoic .