CVE-2025-60954

Microweber CMS 2.0 has Weak Password Requirements. The application does not enforce minimum password length or complexity during password resets. Users can set extremely weak passwords, including single-character passwords, which can lead to account compromise, including administrative accounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:*

History

28 Oct 2025, 14:22

Type Values Removed Values Added
CPE cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:*
First Time Microweber microweber
Microweber
References () https://gist.github.com/progprnv/feae2b76f2db0cb2ac6e14b1bf7d8646 - () https://gist.github.com/progprnv/feae2b76f2db0cb2ac6e14b1bf7d8646 - Exploit, Third Party Advisory
References () https://github.com/microweber/microweber - () https://github.com/microweber/microweber - Product
References () https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-60954 - () https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-60954 - Exploit, Third Party Advisory

24 Oct 2025, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-24 21:16

Updated : 2025-10-28 14:22


NVD link : CVE-2025-60954

Mitre link : CVE-2025-60954

CVE.ORG link : CVE-2025-60954


JSON object : View

Products Affected

microweber

  • microweber
CWE
CWE-521

Weak Password Requirements