Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53910: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wbce-cms WBCE CMS

0
Medium
VulnerabilityCVE-2023-53910cvecve-2023-53910
Published: Wed Dec 17 2025 (12/17/2025, 22:44:47 UTC)
Source: CVE Database V5
Vendor/Project: wbce-cms
Product: WBCE CMS

Description

WBCE CMS 1.6.1 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by inserting script tags into page content through the WYSIWYG editor. Attackers can submit POST requests to /wbce/modules/wysiwyg/save.php with malicious script content in the content parameter to execute JavaScript when users view the affected page.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:17:50 UTC

Technical Analysis

CVE-2023-53910 identifies a stored cross-site scripting vulnerability in WBCE CMS version 1.6.1, a content management system used for website content creation and management. The vulnerability arises from improper neutralization of input during web page generation, specifically within the WYSIWYG editor module. Authenticated attackers can exploit this by submitting POST requests to the /wbce/modules/wysiwyg/save.php endpoint, injecting malicious JavaScript code into the 'content' parameter. This malicious script is then stored persistently in the CMS database and executed in the browsers of users who view the compromised page. The attack vector requires the attacker to have at least limited privileges (authentication) and involves user interaction, as the victim must visit the infected page for the script to execute. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L, meaning low privileges), and user interaction required (UI:P). The impact on confidentiality and integrity is low, with no direct impact on availability. The vulnerability is classified as medium severity with a CVSS score of 5.1. No public exploits have been reported yet, but the stored nature of the XSS makes it a persistent threat that can affect multiple users once exploited. The lack of official patches or mitigation links suggests that organizations must implement interim controls to reduce risk.

Potential Impact

For European organizations using WBCE CMS 1.6.1, this vulnerability poses a risk of client-side attacks that can lead to session hijacking, theft of authentication tokens, defacement, or redirection to malicious sites. Since the vulnerability requires authentication, insider threats or compromised accounts can be leveraged to inject malicious scripts. The stored XSS can affect multiple users, amplifying the impact. Organizations that rely on WBCE CMS for public-facing or internal portals may face reputational damage, data leakage, or compliance issues under GDPR if personal data is compromised. The medium severity indicates moderate risk, but the ease of exploitation by authenticated users and the persistent nature of the attack increase its threat level. Attackers could use this vulnerability to escalate privileges or move laterally within networks. The absence of known exploits reduces immediate risk but does not eliminate it, especially in environments with weak access controls.

Mitigation Recommendations

1. Restrict WYSIWYG editor access strictly to trusted and trained users to minimize the risk of malicious content injection. 2. Implement robust input validation and output encoding on the server side to neutralize script tags and other potentially harmful inputs before storage and rendering. 3. Employ Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers. 4. Monitor logs and user activities for unusual POST requests to /wbce/modules/wysiwyg/save.php and anomalous content changes. 5. If possible, upgrade to a patched version of WBCE CMS once available or apply vendor-provided patches promptly. 6. Educate users about the risks of clicking on suspicious links or interacting with untrusted content within the CMS. 7. Use web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the CMS endpoints. 8. Conduct regular security assessments and penetration tests focusing on CMS modules to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-16T19:22:09.994Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69433601058703ef3fd020ae

Added to database: 12/17/2025, 11:00:17 PM

Last enriched: 12/17/2025, 11:17:50 PM

Last updated: 12/18/2025, 3:52:03 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats