Skip to main content

CVE-2025-51502: n/a

Medium
VulnerabilityCVE-2025-51502cvecve-2025-51502
Published: Fri Aug 01 2025 (08/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the layout parameter on the /admin/page/create page allows arbitrary JavaScript execution in the context of authenticated admin users.

AI-Powered Analysis

AILast updated: 08/01/2025, 17:02:54 UTC

Technical Analysis

CVE-2025-51502 is a reflected Cross-Site Scripting (XSS) vulnerability identified in Microweber CMS version 2.0. The vulnerability arises from improper sanitization or validation of the 'layout' parameter on the /admin/page/create page. When an authenticated administrator accesses this page with a specially crafted 'layout' parameter, arbitrary JavaScript code can be executed within the context of the admin user's browser session. This type of reflected XSS attack does not persist on the server but is triggered when the malicious link is visited. Because the vulnerability affects the administrative interface, successful exploitation could allow attackers to hijack admin sessions, steal authentication tokens, perform unauthorized actions within the CMS, or pivot to further attacks within the affected environment. The lack of a CVSS score and absence of known exploits in the wild suggest this vulnerability is newly disclosed and may not yet be widely exploited. However, the threat is significant given the administrative privileges involved and the potential for complete compromise of the CMS and its hosted content. The vulnerability is specific to Microweber CMS 2.0, a content management system used for website creation and management. No patch or mitigation links are currently provided, indicating that remediation may require vendor action or manual mitigation steps by administrators.

Potential Impact

For European organizations using Microweber CMS 2.0, this vulnerability poses a serious risk to the confidentiality, integrity, and availability of their web content and administrative controls. Exploitation could lead to unauthorized access to sensitive administrative functions, enabling attackers to modify website content, inject malicious scripts for further attacks on site visitors, or exfiltrate sensitive data. This could damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and disrupt business operations. Since the vulnerability requires an authenticated admin user to trigger, the impact is somewhat limited to environments where attackers can trick or coerce administrators into clicking malicious links or where admin credentials are compromised. However, given the administrative context, the consequences of exploitation are severe. European organizations with public-facing websites or intranet portals managed via Microweber CMS are particularly at risk, especially those in sectors with high regulatory scrutiny or critical online presence.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately review and restrict access to the /admin/page/create page to trusted administrators only, ideally behind VPNs or secure network segments. Administrators should be trained to avoid clicking on suspicious links and to verify URLs before accessing admin pages. Implementing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Organizations should monitor web server and application logs for unusual requests involving the 'layout' parameter and suspicious admin page access patterns. Until an official patch is released by Microweber, consider applying web application firewall (WAF) rules to detect and block malicious payloads targeting the 'layout' parameter. Regularly update and audit CMS plugins and extensions to minimize additional attack surfaces. Finally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) for admin accounts to reduce the risk of credential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 688cefb0ad5a09ad00ca6acd

Added to database: 8/1/2025, 4:47:44 PM

Last enriched: 8/1/2025, 5:02:54 PM

Last updated: 8/2/2025, 6:43:42 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats