Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58283: CWE-434: Unrestricted Upload of File with Dangerous Type in wbce WBCE CMS

0
High
VulnerabilityCVE-2024-58283cvecve-2024-58283cwe-434
Published: Wed Dec 10 2025 (12/10/2025, 21:14:54 UTC)
Source: CVE Database V5
Vendor/Project: wbce
Product: WBCE CMS

Description

WBCE CMS version 1.6.2 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the Elfinder file manager. Attackers can exploit the file upload functionality in the elfinder connector to upload a web shell and execute arbitrary system commands through a user-controlled parameter.

AI-Powered Analysis

AILast updated: 12/17/2025, 23:06:06 UTC

Technical Analysis

CVE-2024-58283 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting WBCE CMS version 1.6.2. The vulnerability exists in the Elfinder file manager's connector, which improperly restricts file uploads, allowing authenticated users to upload files with dangerous extensions, specifically PHP scripts. This flaw enables attackers to upload a web shell, which can then be used to execute arbitrary system commands on the server hosting the CMS. The vulnerability does not require user interaction and can be exploited remotely over the network with low attack complexity and no need for elevated privileges beyond authentication. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are currently reported, the vulnerability's nature makes it a prime candidate for exploitation once a proof-of-concept or exploit code becomes available. The vulnerability stems from insufficient validation and sanitization of uploaded files, allowing dangerous file types to be stored and executed on the server. This can lead to full system compromise, data theft, defacement, or use of the server as a pivot point for further attacks.

Potential Impact

For European organizations, exploitation of CVE-2024-58283 could lead to severe consequences including unauthorized access to sensitive data, complete system compromise, and disruption of services. Organizations running WBCE CMS 1.6.2 with the Elfinder file manager exposed to the internet are particularly vulnerable. Attackers could leverage this flaw to deploy web shells, enabling persistent access and lateral movement within the network. This could result in data breaches affecting personal data protected under GDPR, leading to regulatory penalties and reputational damage. Critical sectors such as government, healthcare, education, and media using WBCE CMS may face operational disruptions and loss of trust. Additionally, compromised servers could be used to launch further attacks against European infrastructure or as part of botnets. The high impact on confidentiality, integrity, and availability underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Immediately upgrade WBCE CMS to a version that patches this vulnerability once available. If no patch is currently released, consider disabling the Elfinder file manager or its file upload functionality temporarily. 2. Implement strict server-side validation to restrict file uploads to safe types only, explicitly blocking PHP and other executable file extensions. 3. Employ web application firewalls (WAFs) with rules designed to detect and block malicious file uploads and web shell activity. 4. Restrict access to the Elfinder file manager to trusted users and IP addresses only, using network segmentation and access controls. 5. Monitor web server logs and file system changes for signs of unauthorized uploads or command execution attempts. 6. Conduct regular security audits and penetration testing focusing on file upload functionalities. 7. Educate administrators and developers about secure file handling practices and the risks of unrestricted uploads. 8. Use application-level sandboxing or containerization to limit the impact of potential compromises. 9. Ensure backups are up-to-date and tested to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-10T14:35:24.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e5605ab76fdc5f2656e9

Added to database: 12/10/2025, 9:25:52 PM

Last enriched: 12/17/2025, 11:06:06 PM

Last updated: 2/6/2026, 5:39:53 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats