CVE-2022-1439

MEDIUM EXPLOITED NUCLEI

Microweber < 1.2.15 - XSS

Title source: rule

Description

Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.

Nuclei Templates (1)

Microweber <1.2.15 - Cross-Site Scripting
MEDIUMby pikpikcu
Shodan: http.favicon.hash:780351152 || http.html:"microweber"
FOFA: body="microweber" || icon_hash=780351152

Scores

CVSS v3 6.1
EPSS 0.4593
EPSS Percentile 97.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Details

VulnCheck KEV 2023-12-20
CWE
CWE-79
Status published
Products (2)
microweber/microweber < 1.2.15
microweber/microweber 0 - 1.2.15Packagist
Published Apr 22, 2022
Tracked Since Feb 18, 2026