WBCE CMS version 1.5.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious droplets through the admin panel. Authenticated attackers can exploit the droplet upload functionality in the admin tools to create and execute arbitrary PHP code by crafting a specially designed zip file payload.
References
| Link | Resource |
|---|---|
| https://github.com/WBCE/WBCE_CMS | Product |
| https://wbce.org/ | Product |
| https://wbce.org/de/downloads/ | Product |
| https://www.exploit-db.com/exploits/50707 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/wbce-cms-remote-code-execution-rce-authenticated | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-01-20 17:58
NVD link : CVE-2022-50936
Mitre link : CVE-2022-50936
CVE.ORG link : CVE-2022-50936
JSON object : View
Products Affected
wbce
- wbce_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
