Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 01 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 01 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wtcms Project
Wtcms Project wtcms |
|
| Vendors & Products |
Wtcms Project
Wtcms Project wtcms |
Sun, 30 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in taosir WTCMS up to 01a5f68a3dfc2fdddb44eed967bb2d4f60487665. Impacted is the function fetch of the file /index.php. Performing manipulation of the argument content results in code injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | taosir WTCMS index.php fetch code injection | |
| Weaknesses | CWE-74 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-12-01T21:06:46.543Z
Reserved: 2025-11-29T13:02:31.089Z
Link: CVE-2025-13786
Updated: 2025-12-01T21:06:30.367Z
Status : Awaiting Analysis
Published: 2025-11-30T09:15:45.480
Modified: 2025-12-01T21:15:49.950
Link: CVE-2025-13786
No data.
OpenCVE Enrichment
Updated: 2025-12-01T15:18:10Z