CVE-2022-1439

Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:40

Type Values Removed Values Added
References () https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8 - Patch, Third Party Advisory () https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8 - Patch, Third Party Advisory
References () https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0 - Exploit, Patch, Third Party Advisory () https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0 - Exploit, Patch, Third Party Advisory

Information

Published : 2022-04-22 17:15

Updated : 2024-11-21 06:40


NVD link : CVE-2022-1439

Mitre link : CVE-2022-1439

CVE.ORG link : CVE-2022-1439


JSON object : View

Products Affected

microweber

  • microweber
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')