Unrestricted XML Files Leads to Stored XSS in microweber/microweber


Reported on

Mar 12th 2022


The web Application restricts upload files by blacklist extensions. It's not safe for the application to prevent the attack, there are many extension can cause an attack to user and web application. By uploading XML files, the users can perform an Stored XSS attack

Proof of Concept

[1.] User login with his credential at: https://demo.microweber.org/demo/admin/

[2.] Upload XML files which embed Javascript code on Module "Files" (https://demo.microweber.org/demo/admin/view:modules/load_module:files), this is the content of xml file:

<x:script xmlns:x="http://www.w3.org/1999/xhtml">alert(document.cookie)</x:script>

Payload Image

[3.] By click to view the xml file or access to the URL of this file, Attacker can execute the Javascript code.

XSS Image

XSS Image


If an attacker can control a script that is executed in the victim's browser, they might compromise that user, in this case, an admin, by stealing its cookies.

We are processing your report and will contact the microweber team within 24 hours. 3 months ago
thanhlocpanda modified the report
3 months ago
thanhlocpanda modified the report
3 months ago
We have contacted a member of the microweber team and are waiting to hear back 2 months ago
Bozhidar Slaveykov validated this vulnerability 2 months ago
thanhlocpanda has been awarded the disclosure bounty
The fix bounty is now up for grabs
Bozhidar Slaveykov confirmed that a fix has been merged on 975fc1 2 months ago
Bozhidar Slaveykov has been awarded the fix bounty
to join this conversation