Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press "tab" but there is probably a paylaod that runs without user interaction.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: @huntrdev

Published: 2022-04-22T16:30:14

Updated: 2022-04-22T16:30:14

Reserved: 2022-04-22T00:00:00


Link: CVE-2022-1439

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-04-22T17:15:07.973

Modified: 2022-04-29T04:31:01.377


Link: CVE-2022-1439

JSON object: View

cve-icon Redhat Information

No data.

CWE