Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.
References
| Link | Resource |
|---|---|
| https://gist.github.com/progprnv/feae2b76f2db0cb2ac6e14b1bf7d8646 | Exploit Third Party Advisory |
| https://github.com/microweber/microweber | Product |
| https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-60954 | Exploit Third Party Advisory |
Configurations
History
28 Oct 2025, 14:22
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:* | |
| First Time |
Microweber microweber
Microweber |
|
| References | () https://gist.github.com/progprnv/feae2b76f2db0cb2ac6e14b1bf7d8646 - Exploit, Third Party Advisory | |
| References | () https://github.com/microweber/microweber - Product | |
| References | () https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-60954 - Exploit, Third Party Advisory |
24 Oct 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-24 21:16
Updated : 2025-10-28 14:22
NVD link : CVE-2025-60954
Mitre link : CVE-2025-60954
CVE.ORG link : CVE-2025-60954
JSON object : View
Products Affected
microweber
- microweber
CWE
CWE-521
Weak Password Requirements
