Vulnerability Description
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microweber | Microweber | < 1.2.11 |
Related Weaknesses (CWE)
References
- https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa624PatchThird Party Advisory
- https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55ExploitPatchThird Party Advisory
- https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa624PatchThird Party Advisory
- https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55ExploitPatchThird Party Advisory
FAQ
What is CVE-2022-0666?
CVE-2022-0666 is a vulnerability with a CVSS score of 7.5 (HIGH). CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
How severe is CVE-2022-0666?
CVE-2022-0666 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0666?
Check the references section above for vendor advisories and patch information. Affected products include: Microweber Microweber.