WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 11 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wbce
Wbce wbce Cms
Vendors & Products Wbce
Wbce wbce Cms

Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5.
Title WBCE CMS is Vulnerable to Time-Based Blind SQL Injection through groups[] Parameter
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-10T21:24:43.064Z

Reserved: 2025-11-18T16:14:56.692Z

Link: CVE-2025-65950

cve-icon Vulnrichment

Updated: 2025-12-10T21:24:38.354Z

cve-icon NVD

Status : Received

Published: 2025-12-10T21:16:09.137

Modified: 2025-12-10T21:16:09.137

Link: CVE-2025-65950

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-11T15:16:29Z

Weaknesses