
CVE-2025-51502 Scanner
CVE-2025-51502 Scanner - Cross-Site Scripting (XSS) vulnerability in Microweber CMS
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
22 days 11 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
Microweber CMS is a versatile content management system designed for small to medium-sized businesses to create, publish, and manage web content efficiently. It is used by designers, developers, and business owners for building responsive websites and online stores with ease. The platform offers a user-friendly interface, drag-and-drop features, and a variety of customizable templates. Microweber CMS supports a wide range of plugins and modules, allowing users to extend its functionalities. It is built for those who want to maintain dynamic web content without requiring extensive technical knowledge. The software aims to streamline web content management, making it accessible to all users.
Cross-Site Scripting (XSS) is a security vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. This particular reflected XSS vulnerability in Microweber CMS 2.0 can lead to arbitrary JavaScript execution in the context of authenticated admin users. The vulnerability exists in the admin page creation functionality, specifically affecting the layout parameter. When exploited, it enables attackers to execute HTML or JavaScript code within the admin interface. The risk arises from insufficient input validation, allowing crafted scripts to be executed. This poses a significant threat to script execution integrity in admin sessions.
The technical details of the vulnerability involve the /admin/page/create endpoint, which is affected by reflected XSS through the layout parameter. An attacker could exploit this by tricking an authenticated admin into accessing a maliciously crafted URL. The HTTP GET request containing a payload like '>' in the layout parameter could execute unwanted scripts. Successful exploitation depends on the manipulation of the parameter in a manner that the server processes the input as executable code. The vulnerability arises from the lack of proper encoding or sanitization of the parameter input, making it susceptible to script injection.
If exploited, this vulnerability could impact the confidentiality and integrity of the admin session by allowing the execution of arbitrary JavaScript code. It could facilitate various attacks, including phishing attempts, cookie theft, and session hijacking, compromising admin credentials. Malicious users might use XSS to impersonate admin actions or gain unauthorized access to sensitive areas of the CMS. The impact extends to potential information disclosure and unauthorized modifications to web content managed through the CMS. This could significantly affect the reliability of content delivery and the security of administrative operations.
REFERENCES