HTML Injection vulnerability in create tag functionality in microweber/microweber

Valid

Reported on

Sep 8th 2022


Vulnerability Details

In the Microweber CMS, While doing a live edit on to the application, we have the option to create a new global tag in the application. While creating a global tag, the "Tag Name" input field doesn't properly get sanitized and it's vulnerable to HTML Injection vulnerability

Steps to Reproduce

  • First, Go to the shop and live edit the tag field
  • You will have option to manage new tags
  • In the manage tags, we can create a global tag
  • While creating a global tag, In the "Tag Name" field, enter the simple HTML code like "><h2>XSS
  • After saving the tag you will see a HTML tag got executed

Impact

HTML injection attack is closely related to Cross-site Scripting (XSS). HTML injection uses HTML to deface the page. XSS, as the name implies, injects JavaScript into the page. Both attacks exploit insufficient validation of user input.

We are processing your report and will contact the microweber team within 24 hours. 23 days ago
Nithissh12 modified the report
23 days ago
We have contacted a member of the microweber team and are waiting to hear back 22 days ago
We have sent a follow up to the microweber team. We will try again in 7 days. 19 days ago
We have sent a second follow up to the microweber team. We will try again in 10 days. 12 days ago
Peter Ivanov
12 days ago

Maintainer


Hello, i cant reproduce this. Can you post a video ?

Nithissh12
11 days ago

Researcher


Hi Peter I have updated the reference please check

Peter Ivanov modified the Severity from Medium (6.3) to Medium (4.3) 11 days ago
The researcher has received a minor penalty to their credibility for miscalculating the severity: -1
Peter Ivanov validated this vulnerability 11 days ago
Nithissh12 has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
Peter Ivanov confirmed that a fix has been merged on f20abf 11 days ago
Peter Ivanov has been awarded the fix bounty
Nithissh12
11 days ago

Researcher


Thanks man have a great day ahead :-)

Peter Ivanov
11 days ago

Maintainer


Thanks too , cheers

to join this conversation