CVE-2022-0282

4.3 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in Microweber CMS versions prior to 1.2.11. Attackers can inject malicious scripts into web pages viewed by other users, potentially stealing session cookies or performing actions on behalf of victims. All Microweber installations running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Microweber CMS
Versions: All versions prior to 1.2.11
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The vulnerability exists in the core CMS functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, gain administrative access to the CMS, deface websites, or install backdoors.

🟠

Likely Case

Attackers steal user session cookies or credentials, perform unauthorized actions on behalf of users, or redirect users to malicious sites.

🟢

If Mitigated

With proper input validation and output encoding, impact is limited to minor data leakage or UI disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities are commonly weaponized. The fix commit shows specific input fields that needed sanitization.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.11

Vendor Advisory: https://github.com/microweber/microweber/commit/51b5a4e3ef01e587797c0109159a8ad9d2bac77a

Restart Required: No

Instructions:

1. Backup your Microweber installation and database. 2. Update to version 1.2.11 or later via Composer: 'composer require microweber/microweber:^1.2.11'. 3. Clear cache if applicable. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement custom input validation to sanitize user inputs before processing

Implement server-side validation for all user inputs using PHP's filter_var() or htmlspecialchars() functions

Content Security Policy

all

Implement CSP headers to restrict script execution sources

Add 'Content-Security-Policy: default-src 'self'; script-src 'self'' to HTTP headers

🧯 If You Can't Patch

  • Implement Web Application Firewall (WAF) rules to block XSS payloads
  • Disable user input fields or implement strict input validation for all forms

🔍 How to Verify

Check if Vulnerable:

Check Microweber version in admin panel or via composer: 'composer show microweber/microweber | grep version'

Check Version:

composer show microweber/microweber | grep version

Verify Fix Applied:

Verify version is 1.2.11 or higher and test input fields with basic XSS payloads like '<script>alert(1)</script>'

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags or JavaScript code in parameters
  • Multiple failed login attempts followed by successful login from different IP

Network Indicators:

  • HTTP requests containing '<script>' tags in URL parameters or POST data
  • Unexpected redirects to external domains

SIEM Query:

source="web_logs" AND ("<script>" OR "javascript:" OR "onload=" OR "onerror=")

🔗 References

📤 Share & Export