Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58283: CWE-434: Unrestricted Upload of File with Dangerous Type in wbce WBCE CMS

0
High
VulnerabilityCVE-2024-58283cvecve-2024-58283cwe-434
Published: Wed Dec 10 2025 (12/10/2025, 21:14:54 UTC)
Source: CVE Database V5
Vendor/Project: wbce
Product: WBCE CMS

Description

WBCE CMS version 1.6.2 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the Elfinder file manager. Attackers can exploit the file upload functionality in the elfinder connector to upload a web shell and execute arbitrary system commands through a user-controlled parameter.

AI-Powered Analysis

AILast updated: 12/10/2025, 21:40:33 UTC

Technical Analysis

CVE-2024-58283 is a remote code execution vulnerability identified in WBCE CMS version 1.6.2, specifically linked to the Elfinder file manager component integrated within the CMS. The vulnerability stems from CWE-434, which involves the unrestricted upload of files with dangerous types. In this case, authenticated attackers can exploit the file upload functionality in the Elfinder connector to upload malicious PHP files, such as web shells. Once uploaded, these files can be executed on the server, allowing attackers to run arbitrary system commands. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS 4.0 score of 8.7 reflects high severity due to the potential for full system compromise, impacting confidentiality, integrity, and availability. No patches have been officially released yet, and no known exploits have been detected in the wild, but the risk remains significant given the nature of the vulnerability. The Elfinder file manager is a widely used web-based file management tool, and its integration in WBCE CMS makes this a critical concern for users of this CMS version. The vulnerability highlights the importance of validating and restricting file uploads to prevent execution of malicious code on web servers.

Potential Impact

The impact of CVE-2024-58283 on European organizations using WBCE CMS 1.6.2 can be severe. Successful exploitation allows attackers to gain remote code execution capabilities, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, defacement of websites, deployment of ransomware or other malware, and disruption of services. For organizations handling personal data under GDPR, such breaches could lead to significant regulatory penalties and reputational damage. The vulnerability threatens the confidentiality, integrity, and availability of affected systems. Given the ease of exploitation and the lack of required user interaction, attackers with valid credentials can quickly escalate their access. European entities relying on WBCE CMS for public-facing websites or internal portals are at risk of targeted attacks, especially in sectors like government, education, and small-to-medium enterprises where WBCE CMS might be more prevalent. The absence of known exploits in the wild provides a window for proactive mitigation, but the potential impact remains critical if left unaddressed.

Mitigation Recommendations

To mitigate CVE-2024-58283, European organizations should immediately restrict or disable the Elfinder file manager upload functionality if possible. Implement strict file type validation to block uploads of executable files such as PHP, and enforce whitelist-based file extension policies. Ensure that authentication mechanisms are robust, including strong password policies and multi-factor authentication to reduce the risk of credential compromise. Monitor web server logs and file upload directories for suspicious activity, including unexpected PHP files or web shells. If patching is not yet available, consider isolating the WBCE CMS environment using network segmentation and web application firewalls (WAFs) configured to detect and block malicious payloads. Regularly audit and review user permissions to limit upload capabilities to trusted users only. Additionally, organizations should prepare incident response plans specific to web shell detection and removal. Finally, maintain up-to-date backups of website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-12-10T14:35:24.455Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6939e5605ab76fdc5f2656e9

Added to database: 12/10/2025, 9:25:52 PM

Last enriched: 12/10/2025, 9:40:33 PM

Last updated: 12/11/2025, 2:54:26 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats