Vulnerability Description
Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microweber | Microweber | 2.0.19 |
Related Weaknesses (CWE)
References
- https://gist.github.com/TimRecktenwald/f4b0d1edbb87e75c17c639ca0bacba57ExploitThird Party Advisory
- https://github.com/microweber/microweber/commit/aa0791fc286d785ccd33ccc706f7bb3ePatch
FAQ
What is CVE-2025-70792?
CVE-2025-70792 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileg...
How severe is CVE-2025-70792?
CVE-2025-70792 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-70792?
Check the references section above for vendor advisories and patch information. Affected products include: Microweber Microweber.