Vulnerability Description
WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wbce | Wbce Cms | < 1.6.5 |
Related Weaknesses (CWE)
References
- https://github.com/WBCE/WBCE_CMS/commit/96046178f4c80cf16f7c224054dec7fdadddda7ePatch
- https://github.com/WBCE/WBCE_CMS/releases/tag/1.6.5Release Notes
- https://github.com/WBCE/WBCE_CMS/security/advisories/GHSA-934v-xhx9-j2f3Vendor AdvisoryExploit
FAQ
What is CVE-2025-65950?
CVE-2025-65950 is a vulnerability with a CVSS score of 8.8 (HIGH). WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL qu...
How severe is CVE-2025-65950?
CVE-2025-65950 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-65950?
Check the references section above for vendor advisories and patch information. Affected products include: Wbce Wbce Cms.