Skip to content

Instantly share code, notes, and snippets.

View TimRecktenwald's full-sized avatar

TimRecktenwald

View GitHub Profile
@TimRecktenwald
TimRecktenwald / CVE-2025-70792.md
Created February 4, 2026 22:55
CVE-2025-70792

PoC for CVE-2025-70792

Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.

Description:

App Installation:

  1. Clone the repository and build the application using docker:
    git clone -b v2.0.19 https://github.com/microweber/microweber.git
    cd microweber
    

docker compose up -d

@TimRecktenwald
TimRecktenwald / CVE-2025-70791.md
Last active February 4, 2026 23:04
CVE-2025-70791

PoC for CVE-2025-70791

Cross Site Scripting vulnerability in the "/admin/order/abandoned" endpoint of Microweber <=2.0.19. An attacker can manipulate the "orderDirection" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.

Description:

App Installation:

  1. Clone the repository and build the application using docker:
    git clone -b v2.0.19 https://github.com/microweber/microweber.git
    cd microweber
    

docker compose up -d