First published: Tue Mar 01 2022(Updated: )
Weak Password Recovery Mechanism for Forgotten Password in GitHub repository microweber/microweber prior to 1.3.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Microweber Microweber | <1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0777 is a vulnerability in the GitHub repository microweber/microweber that allows for a weak password recovery mechanism.
CVE-2022-0777 has a severity keyword of 'high' and a severity value of 7.5.
The Microweber Microweber repository prior to version 1.3 is affected.
To fix CVE-2022-0777, you should update your Microweber Microweber repository to version 1.3 or above.
You can find more information about CVE-2022-0777 in the following references: [GitHub Commit](https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f), [Huntr Bounty](https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7).