Unrated severityNVD Advisory· Published Dec 10, 2025· Updated Dec 10, 2025
WBCE CMS is Vulnerable to Time-Based Blind SQL Injection through groups[] Parameter
CVE-2025-65950
Description
WBCE CMS is a content management system. In versions 1.6.4 and below, the user management module allows a low-privileged authenticated user with permissions to modify users to execute arbitrary SQL queries. This can be escalated to a full database compromise, data exfiltration, effectively bypassing all security controls. The vulnerability exists in the admin/users/save.php script, which handles updates to user profiles. The script improperly processes the groups[] parameter sent from the user edit form. This issue is fixed in version 1.6.5.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/WBCE/WBCE_CMS/commit/96046178f4c80cf16f7c224054dec7fdadddda7emitrex_refsource_MISC
- github.com/WBCE/WBCE_CMS/releases/tag/1.6.5mitrex_refsource_MISC
- github.com/WBCE/WBCE_CMS/security/advisories/GHSA-934v-xhx9-j2f3mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.