Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53910: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wbce-cms WBCE CMS

0
Medium
VulnerabilityCVE-2023-53910cvecve-2023-53910
Published: Wed Dec 17 2025 (12/17/2025, 22:44:47 UTC)
Source: CVE Database V5
Vendor/Project: wbce-cms
Product: WBCE CMS

Description

WBCE CMS 1.6.1 contains a stored cross-site scripting vulnerability that allows authenticated attackers to inject malicious JavaScript by inserting script tags into page content through the WYSIWYG editor. Attackers can submit POST requests to /wbce/modules/wysiwyg/save.php with malicious script content in the content parameter to execute JavaScript when users view the affected page.

AI-Powered Analysis

AILast updated: 01/01/2026, 22:27:51 UTC

Technical Analysis

CVE-2023-53910 is a stored cross-site scripting vulnerability identified in WBCE CMS version 1.6.1. The flaw arises from improper neutralization of input during web page generation, specifically in the WYSIWYG editor module. Authenticated users can exploit this vulnerability by submitting POST requests to the /wbce/modules/wysiwyg/save.php endpoint, injecting malicious JavaScript code within the content parameter. Because the input is not properly sanitized or escaped, the malicious script is stored in the CMS database and subsequently rendered in pages viewed by other users. When these pages are loaded, the embedded JavaScript executes in the context of the victim’s browser, potentially allowing attackers to steal session cookies, perform actions on behalf of users, or deliver further payloads. The vulnerability requires the attacker to have authenticated access to the CMS, which limits exploitation to insiders or compromised accounts. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L - low privileges), user interaction required (UI:P), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:N). No known exploits have been reported in the wild, but the vulnerability remains a significant risk for organizations relying on WBCE CMS 1.6.1 for content management. The lack of available patches or official fixes increases the urgency for mitigation through configuration and monitoring.

Potential Impact

For European organizations using WBCE CMS 1.6.1, this vulnerability can lead to unauthorized script execution within the context of the CMS web application. This can compromise user session confidentiality, allowing attackers to hijack sessions or escalate privileges. Integrity of content can be undermined by injecting misleading or malicious scripts, potentially damaging organizational reputation and trust. Availability impact is minimal but could arise indirectly if attackers use the vulnerability to deploy disruptive scripts. Given the requirement for authenticated access, the threat is more pronounced in environments with weak access controls or insider threats. Organizations handling sensitive data or operating critical web portals with WBCE CMS are at higher risk. The vulnerability could facilitate further attacks such as phishing, credential theft, or lateral movement within networks. European entities with regulatory obligations under GDPR must consider the risk of data breaches and the need for timely remediation to avoid compliance penalties.

Mitigation Recommendations

1. Restrict access to the WYSIWYG editor to trusted, trained users only, minimizing the risk of malicious content submission. 2. Implement strict input validation and sanitization on the server side for all content submitted via the WYSIWYG editor, escaping or removing script tags and other potentially dangerous HTML elements. 3. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of XSS attacks. 4. Monitor CMS logs for unusual POST requests to /wbce/modules/wysiwyg/save.php and alert on suspicious content patterns. 5. Enforce strong authentication and session management controls to reduce the risk of compromised accounts being used to exploit this vulnerability. 6. If possible, upgrade to a patched version of WBCE CMS once available or apply community-developed patches. 7. Conduct regular security training for CMS users to recognize and avoid introducing malicious content. 8. Consider deploying web application firewalls (WAFs) with rules targeting XSS payloads specific to WBCE CMS endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-16T19:22:09.994Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69433601058703ef3fd020ae

Added to database: 12/17/2025, 11:00:17 PM

Last enriched: 1/1/2026, 10:27:51 PM

Last updated: 2/7/2026, 12:14:44 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats