Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:* |
Tue, 09 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wbce
Wbce wbce Cms |
|
| Vendors & Products |
Wbce
Wbce wbce Cms |
Tue, 09 Dec 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5. | |
| Title | WBCE CMS has Weak Random Number Generator in Password Generation Function | |
| Weaknesses | CWE-331 CWE-338 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-12-09T15:10:35.359Z
Reserved: 2025-12-08T21:19:11.206Z
Link: CVE-2025-67504
Updated: 2025-12-09T15:10:22.623Z
Status : Analyzed
Published: 2025-12-09T16:18:24.237
Modified: 2025-12-11T15:52:28.497
Link: CVE-2025-67504
No data.
OpenCVE Enrichment
Updated: 2025-12-09T10:04:34Z