Home

Description

Microweber 2.0.15 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts into user profile fields. Attackers can input script payloads in the first name field that will execute when the profile is viewed by other users, potentially stealing session cookies and executing arbitrary JavaScript.

PUBLISHED Reserved 2025-12-10 | Published 2025-12-11 | Updated 2025-12-18 | Assigner VulnCheck




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

2.0.15
affected

Credits

tmrswrr finder

References

www.exploit-db.com/exploits/52058 (ExploitDB-52058) exploit

microweber.me/ (Microweber Homepage) product

github.com/microweber/microweber (Microweber GitHub Repository) product

www.vulncheck.com/...-site-scripting-via-user-profile-fields (VulnCheck Advisory: Microweber 2.0.15 Stored Cross-Site Scripting via User Profile Fields) third-party-advisory

cve.org (CVE-2024-58289)

nvd.nist.gov (CVE-2024-58289)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.