Miggo Logo

CVE-2022-0278:
Cross-site Scripting in microweber

5.4

CVSS Score

Basic Information

EPSS Score
-
Published
1/21/2022
Updated
2/3/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
microweber/microwebercomposer< 1.2.111.2.11

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from inline PHP code in 'userfiles/modules/admin/notifications/notif_form_entry.php' that directly outputs user-controlled data ($val1 and $val1_1) using print statements without proper escaping. While no named functions are involved, the lack of output sanitization (via htmlentities) in these template rendering lines allowed stored XSS. The patch added escaping to these print statements, confirming the vulnerability was in raw output handling rather than specific functions.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* S*riptin* (XSS) - Stor** in P**k**ist mi*row***r/mi*row***r prior to *.*.**.

Reasoning

T** vuln*r**ility st*ms *rom inlin* P*P *o** in 'us*r*il*s/mo*ul*s/**min/noti*i**tions/noti*_*orm_*ntry.p*p' t**t *ir**tly outputs us*r-*ontroll** **t* ($v*l* *n* $v*l*_*) usin* print st*t*m*nts wit*out prop*r *s**pin*. W*il* no n*m** *un*tions *r* i