Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58283: CWE-434: Unrestricted Upload of File with Dangerous Type in wbce WBCE CMS

0
High
VulnerabilityCVE-2024-58283cvecve-2024-58283cwe-434
Published: Wed Dec 10 2025 (12/10/2025, 21:14:54 UTC)
Source: CVE Database V5
Vendor/Project: wbce
Product: WBCE CMS

Description

WBCE CMS version 1.6.2 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the Elfinder file manager. Attackers can exploit the file upload functionality in the elfinder connector to upload a web shell and execute arbitrary system commands through a user-controlled parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 13:57:58 UTC

Technical Analysis

CVE-2024-58283 is a remote code execution vulnerability found in WBCE CMS version 1.6.2, specifically within the Elfinder file manager component. The vulnerability stems from CWE-434, which involves the unrestricted upload of files with dangerous types. In this case, authenticated attackers can exploit the file upload functionality of the Elfinder connector to upload malicious PHP files, such as web shells. Once uploaded, these web shells allow attackers to execute arbitrary system commands on the underlying server through a user-controlled parameter, effectively compromising the server's confidentiality, integrity, and availability. The vulnerability does not require user interaction or elevated privileges beyond authentication, making it easier to exploit in environments where attackers have valid credentials. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the nature of the vulnerability and its ease of exploitation make it a significant threat. The lack of available patches at the time of disclosure increases the urgency for organizations to implement mitigations or consider alternative protective measures.

Potential Impact

The exploitation of CVE-2024-58283 can lead to full system compromise of servers running WBCE CMS 1.6.2. Attackers gaining remote code execution can steal sensitive data, modify or delete content, deploy malware, pivot within the network, and disrupt services, causing significant operational and reputational damage. Since the vulnerability requires only authenticated access, insider threats or compromised credentials can be leveraged to exploit this flaw. The high CVSS score reflects the severe impact on confidentiality, integrity, and availability. Organizations relying on WBCE CMS for web content management are at risk of targeted attacks, especially those with weak authentication controls. The absence of known public exploits currently limits widespread exploitation, but the vulnerability's characteristics make it a prime candidate for future attacks once exploit code becomes available. This threat is particularly critical for organizations hosting sensitive or critical web applications on WBCE CMS.

Mitigation Recommendations

1. Immediately restrict access to the Elfinder file manager to only trusted and necessary users, ideally through network segmentation or VPN access. 2. Implement strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. 3. Monitor and audit file upload activities and web server logs for suspicious uploads or execution attempts, focusing on PHP files or unusual parameters. 4. Disable or remove the Elfinder file manager component if not essential to reduce the attack surface. 5. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to upload executable files or access web shells. 6. If possible, apply input validation and file type restrictions on uploads to prevent dangerous file types from being accepted. 7. Keep the WBCE CMS and all components updated; monitor vendor advisories for patches addressing this vulnerability. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block malicious command execution. 9. Conduct regular security assessments and penetration tests focusing on file upload functionalities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-10T14:35:24.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e5605ab76fdc5f2656e9

Added to database: 12/10/2025, 9:25:52 PM

Last enriched: 3/5/2026, 1:57:58 PM

Last updated: 3/26/2026, 10:13:45 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses