Static Code Injection in microweber/microweber


Reported on

Mar 6th 2022


The Microweber application allows HTML tags in the "First name", "Last name" and "Phone number" which can be exploited by Injecting HTML payloads.

Proof of Concept

1.While buying product we need to fill contact information form.

2.Insert your html code in code block. e.g., <code><p>Hurry Up!<a href="">Go to and get free $1000 in your account now .</a></p></code> (any field except mail)

3.Click on Continue, then your code will be injected into the Personal information section which can be viewed on 'domain/shipping-method' page.

Image & Video POC


This vulnerability can be exploit for phishing attack


We are processing your report and will contact the microweber team within 24 hours. a year ago
We have contacted a member of the microweber team and are waiting to hear back a year ago
Bozhidar Slaveykov validated this vulnerability a year ago
crowdoverflow has been awarded the disclosure bounty
The fix bounty is now up for grabs
Bozhidar Slaveykov marked this as fixed in 1.3 with commit b2baab a year ago
Bozhidar Slaveykov has been awarded the fix bounty
This vulnerability will not receive a CVE
to join this conversation