CVE-2022-2353:
Microweber before v1.2.20 vulnerable to cross-site scripting
6.3
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
7/10/2022
Updated
6/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
microweber/microweber | composer | < 1.2.20 | 1.2.20 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper output encoding in the JavaScript block where the $type variable was directly printed without context-aware escaping. The patch added htmlentities() to sanitize the output and removed dangerous characters via str_replace(), confirming the original code's insufficient neutralization. The file/module handling user-supplied 'type' parameter was identified as the injection point through the commit diff analysis.