Cross-site Scripting (XSS) - Reflected in microweber/microweber


Reported on

Feb 18th 2022


Can escape the meta tag because the user doesn't escape the double-quote in the $redirectUrl parameter when logging out.

Proof of Concept

https://<server>/demo/api/logout?redirect_to=/asdf"><iframe onload=alert(document.domain)>


Through this vulnerability, an attacker is capable to execute malicious scripts.

We are processing your report and will contact the microweber team within 24 hours. 2 years ago
2 years ago



Peter Ivanov validated this vulnerability 2 years ago
Pocas has been awarded the disclosure bounty
The fix bounty is now up for grabs
Peter Ivanov marked this as fixed in 1.2.11 with commit 2b8fa5 2 years ago
Peter Ivanov has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation