Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65094: CWE-266: Incorrect Privilege Assignment in WBCE WBCE_CMS

0
High
VulnerabilityCVE-2025-65094cvecve-2025-65094cwe-266cwe-285
Published: Wed Nov 19 2025 (11/19/2025, 19:06:21 UTC)
Source: CVE Database V5
Vendor/Project: WBCE
Product: WBCE_CMS

Description

WBCE CMS is a content management system. Prior to version 1.6.4, a low-privileged user in WBCE CMS can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php request. The UI restricts users to assigning only their existing group, but server-side validation is missing, allowing attackers to overwrite their group membership and obtain full administrative access. This results in a complete compromise of the CMS. This issue has been patched in version 1.6.4.

AI-Powered Analysis

AILast updated: 11/19/2025, 20:13:24 UTC

Technical Analysis

CVE-2025-65094 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) and CWE-285 (Improper Authorization) affecting WBCE CMS, a content management system. The vulnerability exists in versions prior to 1.6.4, where a low-privileged user can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php HTTP request. The web interface restricts users from assigning groups other than their own, but this restriction is only enforced client-side. The server-side code lacks proper validation and authorization checks, allowing attackers to overwrite their group membership arbitrarily. This results in unauthorized privilege escalation without requiring user interaction or higher privileges beyond a low-level user account. Exploiting this vulnerability grants full administrative access to the CMS, enabling attackers to modify content, manage users, and potentially deploy further malicious payloads or backdoors. The vulnerability is remotely exploitable over the network without authentication beyond a low-privileged user account. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation and the critical impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the vulnerability poses a significant risk to any WBCE CMS deployment that has not applied the patch released in version 1.6.4.

Potential Impact

For European organizations using WBCE CMS, this vulnerability can lead to complete compromise of their web content management system. Attackers gaining administrative access can alter website content, deface pages, steal sensitive data, or implant malware and backdoors, potentially affecting the confidentiality, integrity, and availability of web services. This can damage organizational reputation, lead to data breaches, and disrupt business operations. Public sector entities, educational institutions, and businesses relying on WBCE CMS for critical web presence are particularly at risk. The vulnerability’s remote exploitability and lack of need for user interaction increase the likelihood of exploitation. Additionally, compromised CMS platforms can serve as pivot points for further network intrusion, increasing the overall risk posture of affected organizations.

Mitigation Recommendations

European organizations should immediately upgrade WBCE CMS installations to version 1.6.4 or later, where the vulnerability is patched. Until upgrading is possible, implement strict network segmentation and access controls to limit low-privileged user access to the CMS administration interface. Monitor web server logs for suspicious requests manipulating the groups[] parameter or unusual privilege escalations. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to modify group assignments via HTTP requests. Conduct regular audits of user group memberships to detect unauthorized changes. Additionally, enforce strong authentication and authorization policies to minimize the number of low-privileged users with access to the CMS backend. Educate administrators and developers about the importance of server-side validation to prevent similar vulnerabilities in the future.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-17T20:55:34.691Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e248d4d0ffcb40bb0868e

Added to database: 11/19/2025, 8:11:57 PM

Last enriched: 11/19/2025, 8:13:24 PM

Last updated: 11/19/2025, 9:50:00 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats