Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 16 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wbce
Wbce wbce Cms |
|
| Vendors & Products |
Wbce
Wbce wbce Cms |
Wed, 10 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 10 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5. | |
| Title | WBCE CMS is Vulnerable to Time-Based Blind SQL Injection through groups[] Parameter | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-10T21:24:43.064Z
Reserved: 2025-11-18T16:14:56.692Z
Link: CVE-2025-65950
Updated: 2025-12-10T21:24:38.354Z
Status : Analyzed
Published: 2025-12-10T21:16:09.137
Modified: 2025-12-16T15:10:47.943
Link: CVE-2025-65950
No data.
OpenCVE Enrichment
Updated: 2025-12-11T15:16:29Z