WBCE CMS is a content management system. Prior to version 1.6.4, a low-privileged user in WBCE CMS can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php request. The UI restricts users to assigning only their existing group, but server-side validation is missing, allowing attackers to overwrite their group membership and obtain full administrative access. This results in a complete compromise of the CMS. This issue has been patched in version 1.6.4.
References
| Link | Resource |
|---|---|
| https://github.com/WBCE/WBCE_CMS/commit/96046178f4c80cf16f7c224054dec7fdadddda7e | Patch |
| https://github.com/WBCE/WBCE_CMS/security/advisories/GHSA-hmmw-4ccm-fx44 | Exploit Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-11-19 19:15
Updated : 2025-12-15 14:10
NVD link : CVE-2025-65094
Mitre link : CVE-2025-65094
CVE.ORG link : CVE-2025-65094
JSON object : View
Products Affected
wbce
- wbce_cms
