Browse all 9 CVE security advisories affecting Wbce. AI-powered Chinese analysis, POCs, and references for each vulnerability.
WBCE is a flexible content management system designed for building and managing websites with a focus on ease of use and extensibility. Historically, it has been susceptible to various vulnerability classes including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and insecure default configurations. While no major public security incidents have been widely documented, the 9 recorded CVEs highlight ongoing security concerns, particularly in third-party extensions and outdated installations. The platform's modular architecture introduces additional attack surfaces, requiring regular updates and careful hardening to mitigate risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-65950 | WBCE CMS is Vulnerable to Time-Based Blind SQL Injection through groups[] Parameter — WBCE_CMSCWE-89 | 8.8AI | HighAI | 2025-12-10 |
| CVE-2025-67504 | WBCE CMS has Weak Random Number Generator in Password Generation Function — WBCE_CMSCWE-331 | 9.1 | Critical | 2025-12-09 |
| CVE-2025-66204 | WBCE CMS allows brute-force protection bypass using X-Forwarded-For header — WBCE_CMSCWE-307 | 9.1AI | CriticalAI | 2025-12-08 |
| CVE-2025-65094 | WBCE CMS is Vulnerable to Privilege Escalation via Group ID Manipulation (IDOR) — WBCE_CMSCWE-266 | 8.8AI | HighAI | 2025-11-19 |
This page lists every published CVE security advisory associated with Wbce. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.