WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5.
References
| Link | Resource |
|---|---|
| https://github.com/WBCE/WBCE_CMS/commit/96046178f4c80cf16f7c224054dec7fdadddda7e | Patch |
| https://github.com/WBCE/WBCE_CMS/releases/tag/1.6.5 | Release Notes |
| https://github.com/WBCE/WBCE_CMS/security/advisories/GHSA-934v-xhx9-j2f3 | Vendor Advisory Exploit |
Configurations
History
No history.
Information
Published : 2025-12-10 21:16
Updated : 2025-12-16 15:10
NVD link : CVE-2025-65950
Mitre link : CVE-2025-65950
CVE.ORG link : CVE-2025-65950
JSON object : View
Products Affected
wbce
- wbce_cms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
