Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

microweber — Vulnerabilities & Security Advisories 81

Browse all 81 CVE security advisories affecting microweber. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Microweber is an open-source drag-and-drop content management system designed for website creation and e-commerce. Its architecture, built on the Laravel framework, has historically exposed it to a significant volume of security flaws, with eighty-one Common Vulnerabilities and Exposures currently recorded. The most prevalent issues involve remote code execution, cross-site scripting, and SQL injection, often stemming from insufficient input validation and improper access controls. These vulnerabilities frequently allow attackers to escalate privileges or execute arbitrary commands on the underlying server. While no single catastrophic breach has defined its public history, the sheer number of disclosed defects indicates persistent maintenance challenges. Users must prioritize rigorous patching and configuration hardening to mitigate these risks, as the software’s modular nature can inadvertently expand the attack surface if third-party extensions are not similarly secured.

Found 3 results / 81Clear Filters
Top products by microweber: microweber/microweber microweber

This page lists every published CVE security advisory associated with microweber. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.