Vulnerability Description
Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.
CVSS Score
6.7
MEDIUM
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microweber | Microweber | < 1.2.12 |
Related Weaknesses (CWE)
References
- https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9ePatchThird Party Advisory
- https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622ExploitThird Party Advisory
- https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9ePatchThird Party Advisory
- https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622ExploitThird Party Advisory
FAQ
What is CVE-2022-0921?
CVE-2022-0921 is a vulnerability with a CVSS score of 6.7 (MEDIUM). Abusing Backup/Restore feature to achieve Remote Code Execution in GitHub repository microweber/microweber prior to 1.2.12.
How severe is CVE-2022-0921?
CVE-2022-0921 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0921?
Check the references section above for vendor advisories and patch information. Affected products include: Microweber Microweber.