A vulnerability was found in Microweber 2.0.19. It has been rated as problematic. This issue affects some unknown processing of the file userfiles/modules/settings/group/website_group/index.php of the component Settings Handler. The manipulation of the argument group leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-7548 Microweber vulnerable to XSS attack due to insure `group` component in its Settings handler
Github GHSA Github GHSA GHSA-hcgh-r5gq-6qc2 Microweber vulnerable to XSS attack due to insure `group` component in its Settings handler
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00045}

epss

{'score': 0.00064}


Wed, 09 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Microweber
Microweber microweber
CPEs cpe:2.3:a:microweber:microweber:2.0.19:*:*:*:*:*:*:*
Vendors & Products Microweber
Microweber microweber

Wed, 12 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Microweber 2.0.19. It has been rated as problematic. This issue affects some unknown processing of the file userfiles/modules/settings/group/website_group/index.php of the component Settings Handler. The manipulation of the argument group leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Microweber Settings index.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-03-12T13:37:18.961Z

Reserved: 2025-03-11T14:58:36.520Z

Link: CVE-2025-2214

cve-icon Vulnrichment

Updated: 2025-03-12T13:37:14.353Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-12T00:15:11.770

Modified: 2025-07-09T17:06:31.357

Link: CVE-2025-2214

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.