Home

Description

Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.

PUBLISHED Reserved 2025-09-26 | Published 2025-10-24 | Updated 2025-10-24 | Assigner mitre

References

github.com/microweber/microweber

gist.github.com/progprnv/feae2b76f2db0cb2ac6e14b1bf7d8646

github.com/progprnv/CVE-Reports/blob/main/CVE-2025-60954

cve.org (CVE-2025-60954)

nvd.nist.gov (CVE-2025-60954)

Download JSON