CVE-2025-70792: n/a
CVE-2025-70792 is a Cross Site Scripting (XSS) vulnerability in Microweber version 2. 0. 19 affecting the /admin/category/create endpoint. An attacker can craft a URL manipulating the 'rel_id' parameter to execute arbitrary JavaScript in the browser of an admin user who visits the link. This vulnerability allows code execution in the context of an authenticated admin, potentially leading to session hijacking, privilege escalation, or further compromise of the application. The issue was fixed in Microweber version 2. 0. 20. No known exploits are currently reported in the wild. Organizations using vulnerable versions should upgrade promptly to mitigate risk.
AI Analysis
Technical Summary
CVE-2025-70792 is a reflected Cross Site Scripting (XSS) vulnerability identified in Microweber version 2.0.19, specifically within the /admin/category/create endpoint. The vulnerability arises from improper sanitization or validation of the 'rel_id' parameter in HTTP requests. An attacker can craft a malicious URL embedding JavaScript payloads in the 'rel_id' parameter and trick an administrator into visiting this URL. Upon visiting, the malicious script executes in the context of the admin's browser session, allowing the attacker to perform actions such as stealing session cookies, performing unauthorized actions on behalf of the admin, or delivering further malware. This type of XSS is particularly dangerous because it requires only that an admin user be lured into clicking a link, without needing to authenticate or perform additional actions. The vulnerability was responsibly disclosed and addressed in Microweber version 2.0.20, which includes proper input validation and output encoding to prevent script injection. No public exploits have been reported, but the vulnerability remains critical due to the high privileges of the targeted user and the potential for significant compromise of the CMS and associated web assets.
Potential Impact
For European organizations using Microweber CMS version 2.0.19 or earlier, this vulnerability poses a significant risk to the confidentiality and integrity of their web administration interfaces. Successful exploitation could lead to session hijacking of admin accounts, unauthorized content modification, defacement, or deployment of malicious scripts to site visitors. This could damage organizational reputation, lead to data breaches, or facilitate further attacks within the network. Given that the attack vector involves social engineering (luring an admin to click a malicious link), organizations with less mature security awareness programs are at higher risk. The availability impact is generally low unless attackers use the access to disrupt services. However, the breach of admin privileges can have cascading effects on the security posture of affected organizations. The threat is especially relevant for European entities in sectors with high reliance on web presence and content management, such as media, e-commerce, and public sector websites.
Mitigation Recommendations
Organizations should immediately upgrade Microweber installations to version 2.0.20 or later, where the vulnerability is patched. Until upgrades are completed, administrators should be trained to recognize and avoid suspicious links, especially those targeting admin interfaces. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Web Application Firewalls (WAFs) should be configured to detect and block malicious payloads targeting the 'rel_id' parameter or suspicious URL patterns. Regular security awareness training focusing on phishing and social engineering can reduce the likelihood of successful exploitation. Additionally, monitoring admin account activity for anomalies and enforcing multi-factor authentication (MFA) for admin access can limit damage if credentials are compromised. Finally, organizations should audit their Microweber instances for signs of compromise and review logs for suspicious activity related to this endpoint.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-70792: n/a
Description
CVE-2025-70792 is a Cross Site Scripting (XSS) vulnerability in Microweber version 2. 0. 19 affecting the /admin/category/create endpoint. An attacker can craft a URL manipulating the 'rel_id' parameter to execute arbitrary JavaScript in the browser of an admin user who visits the link. This vulnerability allows code execution in the context of an authenticated admin, potentially leading to session hijacking, privilege escalation, or further compromise of the application. The issue was fixed in Microweber version 2. 0. 20. No known exploits are currently reported in the wild. Organizations using vulnerable versions should upgrade promptly to mitigate risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-70792 is a reflected Cross Site Scripting (XSS) vulnerability identified in Microweber version 2.0.19, specifically within the /admin/category/create endpoint. The vulnerability arises from improper sanitization or validation of the 'rel_id' parameter in HTTP requests. An attacker can craft a malicious URL embedding JavaScript payloads in the 'rel_id' parameter and trick an administrator into visiting this URL. Upon visiting, the malicious script executes in the context of the admin's browser session, allowing the attacker to perform actions such as stealing session cookies, performing unauthorized actions on behalf of the admin, or delivering further malware. This type of XSS is particularly dangerous because it requires only that an admin user be lured into clicking a link, without needing to authenticate or perform additional actions. The vulnerability was responsibly disclosed and addressed in Microweber version 2.0.20, which includes proper input validation and output encoding to prevent script injection. No public exploits have been reported, but the vulnerability remains critical due to the high privileges of the targeted user and the potential for significant compromise of the CMS and associated web assets.
Potential Impact
For European organizations using Microweber CMS version 2.0.19 or earlier, this vulnerability poses a significant risk to the confidentiality and integrity of their web administration interfaces. Successful exploitation could lead to session hijacking of admin accounts, unauthorized content modification, defacement, or deployment of malicious scripts to site visitors. This could damage organizational reputation, lead to data breaches, or facilitate further attacks within the network. Given that the attack vector involves social engineering (luring an admin to click a malicious link), organizations with less mature security awareness programs are at higher risk. The availability impact is generally low unless attackers use the access to disrupt services. However, the breach of admin privileges can have cascading effects on the security posture of affected organizations. The threat is especially relevant for European entities in sectors with high reliance on web presence and content management, such as media, e-commerce, and public sector websites.
Mitigation Recommendations
Organizations should immediately upgrade Microweber installations to version 2.0.20 or later, where the vulnerability is patched. Until upgrades are completed, administrators should be trained to recognize and avoid suspicious links, especially those targeting admin interfaces. Implementing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Web Application Firewalls (WAFs) should be configured to detect and block malicious payloads targeting the 'rel_id' parameter or suspicious URL patterns. Regular security awareness training focusing on phishing and social engineering can reduce the likelihood of successful exploitation. Additionally, monitoring admin account activity for anomalies and enforcing multi-factor authentication (MFA) for admin access can limit damage if credentials are compromised. Finally, organizations should audit their Microweber instances for signs of compromise and review logs for suspicious activity related to this endpoint.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6984d01df9fa50a62f2f1641
Added to database: 2/5/2026, 5:15:09 PM
Last enriched: 2/5/2026, 5:29:59 PM
Last updated: 2/5/2026, 7:33:41 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25630
LowCVE-2026-1301: CWE-787 Out-of-bounds Write in o6 Automation GmbH Open62541
MediumCVE-2026-1707: Vulnerability in pgadmin.org pgAdmin 4
HighCVE-2025-68121: CWE-295: Improper Certificate Validation in Go standard library crypto/tls
HighCVE-2025-58190: CWE-835: Loop with Unreachable Exit Condition in golang.org/x/net golang.org/x/net/html
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.