First published: Mon Jul 11 2022(Updated: )
Authentication Bypass by Spoofing in GitHub repository microweber/microweber prior to 1.2.20.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Microweber Microweber | <1.2.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-2368 is critical with a CVSS score of 9.8.
The affected software version of CVE-2022-2368 is Microweber prior to 1.2.20.
The CVE-2022-2368 vulnerability can be exploited by an attacker to bypass authentication through spoofing.
Yes, a fix for CVE-2022-2368 is available in version 1.2.20 of Microweber.
You can find more information about CVE-2022-2368 on GitHub at https://github.com/microweber/microweber/commit/53c000ccd5602536e28b15d9630eb8261b04a302 and on Huntr at https://huntr.dev/bounties/a9595eda-a5e0-4717-8d64-b445ef83f452.