CVE-2022-0638: Cross-Site Request Forgery microweber
4.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.27185%
CWE
Published
2/18/2022
Updated
2/3/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
microweber/microweber | composer | < 1.2.11 | 1.2.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the logout action not enforcing CSRF protections. The pre-patch code used a direct logout()
call, which likely bypassed Laravel's built-in CSRF validation middleware. The patch replaced this with Auth::logout()
and added proper redirect handling, aligning with Laravel's secure authentication practices. Since the commit directly modifies this method to address the CSRF flaw, we can confidently attribute the vulnerability to the original implementation of the submit method.