Vulnerability Details CVE-2022-1439
Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.383
EPSS Ranking 97.1%
CVSS Severity
CVSS v3 Score 6.3
CVSS v2 Score 4.3
Products affected by CVE-2022-1439
-
cpe:2.3:a:microweber:microweber:-
-
cpe:2.3:a:microweber:microweber:0.750
-
cpe:2.3:a:microweber:microweber:0.8
-
cpe:2.3:a:microweber:microweber:0.823
-
cpe:2.3:a:microweber:microweber:0.830
-
cpe:2.3:a:microweber:microweber:0.9.346
-
cpe:2.3:a:microweber:microweber:0.93
-
cpe:2.3:a:microweber:microweber:0.931
-
cpe:2.3:a:microweber:microweber:0.934
-
cpe:2.3:a:microweber:microweber:0.95
-
cpe:2.3:a:microweber:microweber:0.951
-
cpe:2.3:a:microweber:microweber:1.0.3
-
cpe:2.3:a:microweber:microweber:1.0.4
-
cpe:2.3:a:microweber:microweber:1.0.5
-
cpe:2.3:a:microweber:microweber:1.0.6
-
cpe:2.3:a:microweber:microweber:1.0.7
-
cpe:2.3:a:microweber:microweber:1.0.8
-
cpe:2.3:a:microweber:microweber:1.1
-
cpe:2.3:a:microweber:microweber:1.1.18
-
cpe:2.3:a:microweber:microweber:1.1.20
-
cpe:2.3:a:microweber:microweber:1.1.3
-
cpe:2.3:a:microweber:microweber:1.2.10
-
cpe:2.3:a:microweber:microweber:1.2.11
-
cpe:2.3:a:microweber:microweber:1.2.12
-
cpe:2.3:a:microweber:microweber:1.2.13
-
cpe:2.3:a:microweber:microweber:1.2.14
-
cpe:2.3:a:microweber:microweber:1.2.3
-
cpe:2.3:a:microweber:microweber:1.2.4
-
cpe:2.3:a:microweber:microweber:1.2.5
-
cpe:2.3:a:microweber:microweber:1.2.6
-
cpe:2.3:a:microweber:microweber:1.2.7
-
cpe:2.3:a:microweber:microweber:1.2.8
-
cpe:2.3:a:microweber:microweber:1.2.9