CVE-2025-51501
Description
Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A reflected XSS vulnerability in the id parameter of Microweber CMS 2.0's live_edit.module_settings API endpoint allows attackers to execute arbitrary JavaScript.
Vulnerability
Overview
CVE-2025-51501 is a reflected Cross-Site Scripting (XSS) vulnerability found in Microweber CMS version 2.0. The flaw resides in the id parameter of the live_edit.module_settings API endpoint. Microweber is a drag-and-drop website builder and CMS built on Laravel 10, offering real-time editing and an e-commerce platform. The vulnerability allows an attacker to inject arbitrary client-side scripts via the id parameter, which are then reflected back to the user's browser without proper sanitization or encoding [1][2].
Exploitation and
Attack Surface
Exploitation of this vulnerability requires no authentication and can be triggered by convincing a logged-in user to click on a crafted link. The attacker does not need any special network position; the attack can be carried out remotely via a malicious URL. The id parameter is directly reflected without validation, enabling the injection of arbitrary HTML and JavaScript. Given the administrative nature of the live_edit.module_settings endpoint, the attack surface is particularly dangerous as it targets backend users [3][4].
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript within the context of the victim's browser session. This can lead to session hijacking, defacement of the admin panel, or exfiltration of sensitive data such as cookies, tokens, or API keys. Because the endpoint is associated with module settings, an attacker could potentially alter site configurations or escalate privileges. The impact is amplified by the fact that Microweber is often used for e-commerce, where session compromise could expose customer data or payment information [2][4].
Mitigation
Status
As of the publication date (2025-08-01), no official patch from Microweber has been reported. Users are advised to sanitize the id parameter manually or apply input validation, restrict access to the affected endpoint, and enforce Content Security Policy (CSP) headers. Given the lack of a vendor fix, organizations using Microweber 2.0 should monitor the vendor's GitHub repository for updates and consider temporary workarounds until a patch is available [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
microweber/microweberPackagist | >= 2.0.0, <= 2.0.19 | — |
Affected products
2- Microweber/Microweber CMSdescription
- Range: 2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.