VYPR
Moderate severityNVD Advisory· Published Aug 1, 2025· Updated Aug 1, 2025

CVE-2025-51502

CVE-2025-51502

Description

Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the layout parameter on the /admin/page/create page allows arbitrary JavaScript execution in the context of authenticated admin users.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Reflected XSS in Microweber CMS 2.0 allows authenticated attackers to execute arbitrary JavaScript via the layout parameter on the /admin/page/create page.

Overview

CVE-2025-51502 is a reflected cross-site scripting (XSS) vulnerability found in Microweber CMS version 2.0. The issue exists in the /admin/page/create page, where the layout parameter is not properly sanitized before being reflected back to the user. An authenticated administrator who visits a crafted URL containing malicious JavaScript in the layout parameter will have that script executed in their browser session.

Exploitation

Context

The attack requires the target to be an authenticated administrator[1]. An attacker can craft a malicious link that, when clicked by an admin, triggers arbitrary JavaScript execution. This is a reflected XSS, meaning the payload is delivered via the URL and executed in the context of the vulnerable page[2]. No additional privileges beyond a valid admin session are needed for exploitation, but the attacker must lure an admin to follow the crafted link.

Impact

Successful exploitation allows arbitrary JavaScript execution in the admin's browser session. This could lead to session hijacking, admin account takeover, forced actions on behalf of the admin, or injection of malicious content into the CMS[2]. Since the CMS has drag-and-drop page building and e-commerce features[1], the impact could extend to site defacement, credential theft, or unauthorized modifications to store content.

Mitigation

As of the publication date, no patch has been released by Microweber. Users are advised to avoid clicking untrusted links while logged into the admin panel and to monitor official channels for updates[2][3]. The vendor has not yet acknowledged the vulnerability in their repository[1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
microweber/microweberPackagist
>= 2.0.0, <= 2.0.19

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.