WBCE CMS version 1.5.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious droplets through the admin panel. Authenticated attackers can exploit the droplet upload functionality in the admin tools to create and execute arbitrary PHP code by crafting a specially designed zip file payload.
References
| Link | Resource |
|---|---|
| https://github.com/WBCE/WBCE_CMS | Product |
| https://wbce.org/ | Product |
| https://wbce.org/de/downloads/ | Product |
| https://www.exploit-db.com/exploits/50707 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/wbce-cms-remote-code-execution-rce-authenticated | Third Party Advisory |
Configurations
History
20 Jan 2026, 17:58
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/WBCE/WBCE_CMS - Product | |
| References | () https://wbce.org/ - Product | |
| References | () https://wbce.org/de/downloads/ - Product | |
| References | () https://www.exploit-db.com/exploits/50707 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/wbce-cms-remote-code-execution-rce-authenticated - Third Party Advisory | |
| First Time |
Wbce
Wbce wbce Cms |
|
| CPE | cpe:2.3:a:wbce:wbce_cms:1.5.2:*:*:*:*:*:*:* |
13 Jan 2026, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:15
Updated : 2026-01-20 17:58
NVD link : CVE-2022-50936
Mitre link : CVE-2022-50936
CVE.ORG link : CVE-2022-50936
JSON object : View
Products Affected
wbce
- wbce_cms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
