CVE-2025-70791 Overview
CVE-2025-70791 is a Cross-Site Scripting (XSS) vulnerability affecting Microweber CMS version 2.0.19. The vulnerability exists in the /admin/order/abandoned endpoint, where the orderDirection parameter fails to properly sanitize user input. An attacker can craft a malicious URL containing JavaScript code and lure an administrator into visiting it, resulting in arbitrary JavaScript execution within the victim's browser context.
Critical Impact
Attackers can execute arbitrary JavaScript in the context of an authenticated administrator's session, potentially leading to session hijacking, administrative account compromise, or further attacks against the CMS infrastructure.
Affected Products
- Microweber CMS version 2.0.19
- Microweber CMS versions prior to 2.0.20
Discovery Timeline
- 2026-02-05 - CVE CVE-2025-70791 published to NVD
- 2026-02-05 - Last updated in NVD database
Technical Details for CVE-2025-70791
Vulnerability Analysis
This reflected XSS vulnerability occurs within Microweber's administrative interface, specifically targeting the abandoned order management functionality. The vulnerability requires user interaction, as an administrator must be tricked into clicking a malicious link. Once triggered, the attacker's JavaScript payload executes within the authenticated session context, providing access to sensitive administrative functions and session tokens.
The attack scope extends beyond the vulnerable domain (changed scope), meaning the malicious script can potentially interact with other origins or exfiltrate data to external servers. While the vulnerability does not directly impact system availability, successful exploitation can lead to confidentiality breaches through data theft and integrity violations through unauthorized administrative actions.
Root Cause
The root cause is improper input validation and output encoding in the /admin/order/abandoned endpoint. The orderDirection parameter value is reflected in the page response without adequate sanitization or escaping, allowing an attacker to inject malicious script content that the browser interprets as executable code rather than data.
This is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web application vulnerability that occurs when user-controllable input is included in dynamically generated web pages without proper encoding.
Attack Vector
The attack is network-based and requires social engineering to convince an authenticated administrator to click a crafted URL. The attacker constructs a URL targeting the vulnerable endpoint with a malicious orderDirection parameter value containing JavaScript code. When the administrator visits this URL while logged into the Microweber admin panel, the injected script executes with the administrator's privileges.
A proof-of-concept demonstrating this vulnerability is available in the GitHub Gist published by Tim Recktenwald. The exploitation technique involves manipulating the orderDirection parameter to inject script tags or event handlers that execute arbitrary JavaScript when the page renders.
Detection Methods for CVE-2025-70791
Indicators of Compromise
- HTTP requests to /admin/order/abandoned containing suspicious characters in the orderDirection parameter such as <script>, javascript:, or encoded variants
- Unusual outbound connections from administrator workstations following access to the Microweber admin panel
- Evidence of session token exfiltration or unauthorized administrative actions in CMS audit logs
Detection Strategies
- Implement Web Application Firewall (WAF) rules to detect and block XSS payloads in URL parameters targeting the /admin/order/abandoned endpoint
- Monitor server access logs for requests containing script injection patterns in query string parameters
- Deploy browser-based XSS protection mechanisms and Content Security Policy (CSP) headers to mitigate script execution from untrusted sources
Monitoring Recommendations
- Enable detailed logging for all administrative endpoint access and review for anomalous parameter values
- Configure alerting for requests containing common XSS payload signatures targeting Microweber administrative paths
- Monitor for suspicious JavaScript execution patterns or unexpected DOM modifications in administrator browser sessions
How to Mitigate CVE-2025-70791
Immediate Actions Required
- Upgrade Microweber CMS to version 2.0.20 or later immediately, as this version contains the security fix for CVE-2025-70791
- Implement Content Security Policy (CSP) headers to restrict script execution sources as a defense-in-depth measure
- Educate administrators about the risks of clicking untrusted links while logged into the CMS
Patch Information
The Microweber development team has addressed this vulnerability in version 2.0.20. The fix is available in the GitHub commit aa0791fc286d785ccd33ccc706f7bb3ed05b1d7f, which implements proper input sanitization for the orderDirection parameter to prevent XSS injection.
Workarounds
- Restrict access to the Microweber administrative interface to trusted IP addresses or VPN-only access until patching is complete
- Implement a reverse proxy or WAF rule to filter malicious input in the orderDirection parameter
- Instruct administrators to avoid clicking links to the admin panel from external sources and instead navigate directly to the administrative URL
# Example CSP header configuration for Apache
# Add to .htaccess or virtual host configuration
Header set Content-Security-Policy "default-src 'self'; script-src 'self'; object-src 'none';"
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

