CVE-2022-1504: Cross-site Scripting in microweber
6.3
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55008%
CWE
Published
4/28/2022
Updated
1/30/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
microweber/microweber | composer | < 1.2.15 | 1.2.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The XSS vulnerability stemmed from insufficient input sanitization in the module endpoint handler. The commit diff shows replacement of AntiXSS
with a custom XSSClean
class that adds protection against 80+ event handler attributes. The original AntiXSS
implementation in module()
only performed basic tag stripping and xss_clean()
, but didn't block modern event handlers demonstrated in the test case (ontransitionrun=alert(1)). The vulnerable function directly processes the 'module' parameter from the URL without proper context-aware output encoding, making it susceptible to reflected XSS payloads.