Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.
History

Thu, 05 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Description Cross Site Scripting vulnerability in the "/admin/category/create" endpoint of Microweber 2.0.19. An attacker can manipulate the "rel_id" parameter in a crafted URL and lure a user with admin privileges into visiting it, achieving JavaScript code execution in the victim's browser. The issue was reported to the developers and fixed in version 2.0.20.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-02-05T20:50:03.356Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70792

cve-icon Vulnrichment

Updated: 2026-02-05T20:47:52.294Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-05T17:16:13.103

Modified: 2026-02-05T21:15:52.443

Link: CVE-2025-70792

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.