CVSS 3.1 Score 7.5 of 10 (high)


Published Dec 8, 2023
Updated: Dec 11, 2023


CVE-2023-48122 is a vulnerability found in microweber version 2.0.1, which has been fixed in version 2.0.4. It allows a remote attacker to access sensitive information through the HTTP GET method. The affected products include taskvY, tw7VEo, and tw7VEp. The base severity of this vulnerability is rated as HIGH, with a base score of 7.5 out of 10. The confidentiality impact is considered HIGH, while the integrity impact is NONE and the availability impact is NONE. The exploitability score is 3.9 out of 10, indicating a moderate level of vulnerability exploitation potential. No user interaction or privileges are required for an attacker to exploit this vulnerability, and it can be exploited through a network attack vector. Organizations using microweber should update to version 2.0.4 to remediate this vulnerability and prevent the potential disclosure of sensitive information.

Leverage our Vulnerability Intelligence module to secure your systems now - get detailed insights on CVE-2024-37364. Book your demo today.


Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-48122 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options