Vulnerabilities (CVE)

Filtered by vendor Microweber Subscribe
Total 88 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-0557 1 Microweber 1 Microweber 2024-02-04 9.0 HIGH 7.2 HIGH
OS Command Injection in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0961 1 Microweber 1 Microweber 2024-02-04 4.3 MEDIUM 5.5 MEDIUM
The microweber application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in GitHub repository microweber/microweber prior to 1.2.12.
CVE-2022-0930 1 Microweber 1 Microweber 2024-02-04 3.5 LOW 4.8 MEDIUM
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
CVE-2022-2252 1 Microweber 1 Microweber 2024-02-04 5.8 MEDIUM 6.1 MEDIUM
Open Redirect in GitHub repository microweber/microweber prior to 1.2.19.
CVE-2022-1439 1 Microweber 1 Microweber 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
CVE-2022-0719 1 Microweber 1 Microweber 2024-02-04 3.5 LOW 5.4 MEDIUM
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.3.
CVE-2022-0505 1 Microweber 1 Microweber 2024-02-04 4.3 MEDIUM 6.5 MEDIUM
Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0378 1 Microweber 1 Microweber 2024-02-04 4.3 MEDIUM 5.4 MEDIUM
Cross-site Scripting (XSS) - Reflected in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0504 1 Microweber 1 Microweber 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0277 1 Microweber 1 Microweber 2024-02-04 4.0 MEDIUM 6.5 MEDIUM
Incorrect Permission Assignment for Critical Resource in Packagist microweber/microweber prior to 1.2.11.
CVE-2021-33988 1 Microweber 1 Microweber 2024-02-04 4.3 MEDIUM 6.1 MEDIUM
Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.
CVE-2022-0282 1 Microweber 1 Microweber 2024-02-04 5.0 MEDIUM 7.5 HIGH
Cross-site Scripting in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0278 1 Microweber 1 Microweber 2024-02-04 3.5 LOW 5.4 MEDIUM
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0506 1 Microweber 1 Microweber 2024-02-04 3.5 LOW 5.4 MEDIUM
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0281 1 Microweber 1 Microweber 2024-02-04 5.0 MEDIUM 7.5 HIGH
Exposure of Sensitive Information to an Unauthorized Actor in Packagist microweber/microweber prior to 1.2.11.
CVE-2022-0379 1 Microweber 1 Microweber 2024-02-04 3.5 LOW 5.4 MEDIUM
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
CVE-2020-23140 1 Microweber 1 Microweber 2024-02-04 5.8 MEDIUM 8.1 HIGH
Microweber 1.1.18 is affected by insufficient session expiration. When changing passwords, both sessions for when a user changes email and old sessions in any other browser or device, the session does not expire and remains active.
CVE-2020-23138 1 Microweber 1 Microweber 2024-02-04 7.5 HIGH 9.8 CRITICAL
An unrestricted file upload vulnerability was discovered in the Microweber 1.1.18 admin account page. An attacker can upload PHP code or any extension (eg- .exe) to the web server by providing image data and the image/jpeg content type with a .php extension.
CVE-2020-23136 1 Microweber 1 Microweber 2024-02-04 2.1 LOW 5.5 MEDIUM
Microweber v1.1.18 is affected by no session expiry after log-out.
CVE-2020-28337 1 Microweber 1 Microweber 2024-02-04 6.5 MEDIUM 7.2 HIGH
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with file paths including relative paths (i.e., ../../), move this file into the backup directory, and execute a restore on this file.