CVE-2025-65950

8.8 HIGH

📋 TL;DR

WBCE CMS versions 1.6.4 and below contain a SQL injection vulnerability in the user management module. Authenticated users with permission to modify other users can execute arbitrary SQL queries, potentially leading to full database compromise and data exfiltration. This affects all deployments running vulnerable versions.

💻 Affected Systems

Products:
  • WBCE CMS
Versions: 1.6.4 and below
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with permissions to modify other users. Default installations include such permissions for certain roles.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise including administrative credential theft, data destruction, and complete system takeover via privilege escalation.

🟠

Likely Case

Data exfiltration of user information, configuration data, and potential lateral movement within the database.

🟢

If Mitigated

Limited to authenticated user access scope with proper input validation and query parameterization in place.

🌐 Internet-Facing: HIGH - Web CMS systems are typically internet-facing, making them accessible to attackers.
🏢 Internal Only: MEDIUM - Internal attackers with authenticated access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once authenticated. The vulnerability is in a core administrative function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.5

Vendor Advisory: https://github.com/WBCE/WBCE_CMS/security/advisories/GHSA-934v-xhx9-j2f3

Restart Required: No

Instructions:

1. Backup your database and files. 2. Download WBCE CMS 1.6.5 from official repository. 3. Replace all files except config.php and uploads directory. 4. Run update script if prompted. 5. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Add input validation for groups[] parameter in admin/users/save.php

Edit admin/users/save.php and add parameter validation before processing groups[] input

Permission Restriction

all

Temporarily restrict user modification permissions to administrators only

Modify user role permissions in WBCE CMS admin interface to limit who can edit users

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block SQL injection patterns targeting the groups[] parameter
  • Restrict network access to the admin interface using IP whitelisting or VPN requirements

🔍 How to Verify

Check if Vulnerable:

Check if version is 1.6.4 or below and review admin/users/save.php for improper groups[] parameter handling

Check Version:

Check VERSION file in WBCE CMS root directory or view admin dashboard

Verify Fix Applied:

Verify version is 1.6.5 or above and check that groups[] parameter is properly sanitized in admin/users/save.php

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple user modification attempts from single account
  • Unexpected parameter values in groups[] field

Network Indicators:

  • POST requests to admin/users/save.php with unusual groups[] parameter values
  • SQL error messages in HTTP responses

SIEM Query:

source="web_logs" AND uri="/admin/users/save.php" AND (groups[] CONTAINS "'" OR groups[] CONTAINS ";" OR groups[] CONTAINS "--")

🔗 References

📤 Share & Export