Open Redirect Affecting microweber/microweber package, versions <1.2.11
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.08% (34th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-MICROWEBERMICROWEBER-2400647
- published 13 Feb 2022
- disclosed 13 Feb 2022
- credit Rohan Sharma
Introduced: 13 Feb 2022
CVE-2022-0560 Open this link in a new tabHow to fix?
Upgrade microweber/microweber
to version 1.2.11 or higher.
Overview
microweber/microweber is a new generation CMS with drag and drop.
Affected versions of this package are vulnerable to Open Redirect via the redirect()
function, which does not check if the URL redirected to is a part of the site's domain, allowing a malicious user to abuse that weakness and redirect victims to their own sites masquerading as the original one, potentially tricking users into submitting sensitive information.
References
CVSS Scores
version 3.1