CVE-2025-65094: CWE-266: Incorrect Privilege Assignment in WBCE WBCE_CMS
WBCE CMS is a content management system. Prior to version 1.6.4, a low-privileged user in WBCE CMS can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php request. The UI restricts users to assigning only their existing group, but server-side validation is missing, allowing attackers to overwrite their group membership and obtain full administrative access. This results in a complete compromise of the CMS. This issue has been patched in version 1.6.4.
AI Analysis
Technical Summary
CVE-2025-65094 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) and CWE-285 (Improper Authorization) affecting WBCE CMS, a content management system. The vulnerability exists in versions prior to 1.6.4, where a low-privileged user can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php HTTP request. The web interface restricts users from assigning groups other than their own, but this restriction is only enforced client-side. The server-side code lacks proper validation and authorization checks, allowing attackers to overwrite their group membership arbitrarily. This results in unauthorized privilege escalation without requiring user interaction or higher privileges beyond a low-level user account. Exploiting this vulnerability grants full administrative access to the CMS, enabling attackers to modify content, manage users, and potentially deploy further malicious payloads or backdoors. The vulnerability is remotely exploitable over the network without authentication beyond a low-privileged user account. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation and the critical impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the vulnerability poses a significant risk to any WBCE CMS deployment that has not applied the patch released in version 1.6.4.
Potential Impact
For European organizations using WBCE CMS, this vulnerability can lead to complete compromise of their web content management system. Attackers gaining administrative access can alter website content, deface pages, steal sensitive data, or implant malware and backdoors, potentially affecting the confidentiality, integrity, and availability of web services. This can damage organizational reputation, lead to data breaches, and disrupt business operations. Public sector entities, educational institutions, and businesses relying on WBCE CMS for critical web presence are particularly at risk. The vulnerability’s remote exploitability and lack of need for user interaction increase the likelihood of exploitation. Additionally, compromised CMS platforms can serve as pivot points for further network intrusion, increasing the overall risk posture of affected organizations.
Mitigation Recommendations
European organizations should immediately upgrade WBCE CMS installations to version 1.6.4 or later, where the vulnerability is patched. Until upgrading is possible, implement strict network segmentation and access controls to limit low-privileged user access to the CMS administration interface. Monitor web server logs for suspicious requests manipulating the groups[] parameter or unusual privilege escalations. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to modify group assignments via HTTP requests. Conduct regular audits of user group memberships to detect unauthorized changes. Additionally, enforce strong authentication and authorization policies to minimize the number of low-privileged users with access to the CMS backend. Educate administrators and developers about the importance of server-side validation to prevent similar vulnerabilities in the future.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-65094: CWE-266: Incorrect Privilege Assignment in WBCE WBCE_CMS
Description
WBCE CMS is a content management system. Prior to version 1.6.4, a low-privileged user in WBCE CMS can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php request. The UI restricts users to assigning only their existing group, but server-side validation is missing, allowing attackers to overwrite their group membership and obtain full administrative access. This results in a complete compromise of the CMS. This issue has been patched in version 1.6.4.
AI-Powered Analysis
Technical Analysis
CVE-2025-65094 is a vulnerability classified under CWE-266 (Incorrect Privilege Assignment) and CWE-285 (Improper Authorization) affecting WBCE CMS, a content management system. The vulnerability exists in versions prior to 1.6.4, where a low-privileged user can escalate their privileges to the Administrators group by manipulating the groups[] parameter in the /admin/users/save.php HTTP request. The web interface restricts users from assigning groups other than their own, but this restriction is only enforced client-side. The server-side code lacks proper validation and authorization checks, allowing attackers to overwrite their group membership arbitrarily. This results in unauthorized privilege escalation without requiring user interaction or higher privileges beyond a low-level user account. Exploiting this vulnerability grants full administrative access to the CMS, enabling attackers to modify content, manage users, and potentially deploy further malicious payloads or backdoors. The vulnerability is remotely exploitable over the network without authentication beyond a low-privileged user account. The CVSS 4.0 base score is 8.7 (high severity), reflecting the ease of exploitation and the critical impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild yet, the vulnerability poses a significant risk to any WBCE CMS deployment that has not applied the patch released in version 1.6.4.
Potential Impact
For European organizations using WBCE CMS, this vulnerability can lead to complete compromise of their web content management system. Attackers gaining administrative access can alter website content, deface pages, steal sensitive data, or implant malware and backdoors, potentially affecting the confidentiality, integrity, and availability of web services. This can damage organizational reputation, lead to data breaches, and disrupt business operations. Public sector entities, educational institutions, and businesses relying on WBCE CMS for critical web presence are particularly at risk. The vulnerability’s remote exploitability and lack of need for user interaction increase the likelihood of exploitation. Additionally, compromised CMS platforms can serve as pivot points for further network intrusion, increasing the overall risk posture of affected organizations.
Mitigation Recommendations
European organizations should immediately upgrade WBCE CMS installations to version 1.6.4 or later, where the vulnerability is patched. Until upgrading is possible, implement strict network segmentation and access controls to limit low-privileged user access to the CMS administration interface. Monitor web server logs for suspicious requests manipulating the groups[] parameter or unusual privilege escalations. Employ Web Application Firewalls (WAFs) with custom rules to detect and block attempts to modify group assignments via HTTP requests. Conduct regular audits of user group memberships to detect unauthorized changes. Additionally, enforce strong authentication and authorization policies to minimize the number of low-privileged users with access to the CMS backend. Educate administrators and developers about the importance of server-side validation to prevent similar vulnerabilities in the future.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-17T20:55:34.691Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e248d4d0ffcb40bb0868e
Added to database: 11/19/2025, 8:11:57 PM
Last enriched: 11/19/2025, 8:13:24 PM
Last updated: 11/19/2025, 9:50:00 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11884: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in OpenText™ uCMDB
LowCVE-2025-63719: n/a
UnknownCVE-2025-13412: Cross Site Scripting in Campcodes Retro Basketball Shoes Online Store
MediumCVE-2025-13147: CWE-918 Server-Side Request Forgery (SSRF) in Progress MOVEit Transfer
MediumCVE-2025-63371: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.