Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.
References
| Link | Resource |
|---|---|
| https://gist.github.com/progprnv/feae2b76f2db0cb2ac6e14b1bf7d8646 | Exploit Third Party Advisory |
| https://github.com/microweber/microweber | Product |
| https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-60954 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-10-24 21:16
Updated : 2025-10-28 14:22
NVD link : CVE-2025-60954
Mitre link : CVE-2025-60954
CVE.ORG link : CVE-2025-60954
JSON object : View
Products Affected
microweber
- microweber
CWE
CWE-521
Weak Password Requirements
