Vulnerability Description
Reflected XSS in GitHub repository microweber/microweber prior to 1.2.16. Executing JavaScript as the victim
CVSS Score
6.1
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microweber | Microweber | < 1.2.16 |
Related Weaknesses (CWE)
References
- https://github.com/microweber/microweber/commit/527abd148e6b7aff8df92a9f1aa951e5PatchThird Party Advisory
- https://huntr.dev/bounties/69f4ca67-d615-4f25-b2d1-19df7bf1107dExploitIssue TrackingPatch
- https://github.com/microweber/microweber/commit/527abd148e6b7aff8df92a9f1aa951e5PatchThird Party Advisory
- https://huntr.dev/bounties/69f4ca67-d615-4f25-b2d1-19df7bf1107dExploitIssue TrackingPatch
FAQ
What is CVE-2022-1584?
CVE-2022-1584 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Reflected XSS in GitHub repository microweber/microweber prior to 1.2.16. Executing JavaScript as the victim
How severe is CVE-2022-1584?
CVE-2022-1584 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-1584?
Check the references section above for vendor advisories and patch information. Affected products include: Microweber Microweber.