CVE-2022-1439
MEDIUM EXPLOITED NUCLEIMicroweber < 1.2.15 - XSS
Title source: ruleDescription
Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
Nuclei Templates (1)
Microweber <1.2.15 - Cross-Site Scripting
MEDIUMby pikpikcu
Shodan:
http.favicon.hash:780351152 || http.html:"microweber"
FOFA:
body="microweber" || icon_hash=780351152
Scores
CVSS v3
6.1
EPSS
0.4593
EPSS Percentile
97.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
VulnCheck KEV
2023-12-20
CWE
CWE-79
Status
published
Products (2)
microweber/microweber
< 1.2.15
microweber/microweber
0 - 1.2.15Packagist
Published
Apr 22, 2022
Tracked Since
Feb 18, 2026