Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 11 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:* |
Tue, 09 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wbce
Wbce wbce Cms |
|
| Vendors & Products |
Wbce
Wbce wbce Cms |
Tue, 09 Dec 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5. | |
| Title | WBCE CMS has Weak Random Number Generator in Password Generation Function | |
| Weaknesses | CWE-331 CWE-338 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T15:10:35.359Z
Reserved: 2025-12-08T21:19:11.206Z
Link: CVE-2025-67504
Updated: 2025-12-09T15:10:22.623Z
Status : Analyzed
Published: 2025-12-09T16:18:24.237
Modified: 2025-12-11T15:52:28.497
Link: CVE-2025-67504
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:34Z