Security for everyone

CVE-2022-25369 Scanner

Detects 'Unauthenticated Admin User Creation' vulnerability in Dynamicweb affects v. 9.5.0 - 9.12.7.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one


Parent Category

CVE-2022-25369 Scanner Detail

Dynamicweb is a popular content management system designed to help create and manage professional websites. It is often used by small to medium-sized businesses that require a flexible and scalable platform to build and enhance their businesses online. The platform offers a range of powerful modules, including e-commerce, marketing automation, and content management, which enable businesses to customize and optimize their online presence to meet their specific needs.

Unfortunately, the platform has been found to contain a severe vulnerability, identified as CVE-2022-25369. This vulnerability allows an unauthenticated attacker to create a new administrative user, providing them with complete control and access to the entire site. The attacker can also allocate administrative privileges to other users, leaving the site open to further exploitation.

The consequences of exploiting this vulnerability can be catastrophic for businesses. An attacker could potentially take over the entire site, steal sensitive information, and disrupt normal site operations. In the hands of a malicious actor, this vulnerability could lead to devastating financial losses, loss of critical data, and damage to a company's reputation.

At, we understand the importance of protecting online business assets and digital information. With our powerful security features and tools, businesses can rest assured that their online presence is protected. Our platform offers advanced threat detection, vulnerability scanning, and security alerts to ensure maximum protection for our clients. With, businesses can stay on top of potential threats and vulnerabilities to keep their online presence safe and secure.




cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture