WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5.
History

Thu, 11 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:*

Tue, 09 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 09 Dec 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Wbce
Wbce wbce Cms
Vendors & Products Wbce
Wbce wbce Cms

Tue, 09 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5.
Title WBCE CMS has Weak Random Number Generator in Password Generation Function
Weaknesses CWE-331
CWE-338
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-12-09T03:31:17.723Z

Updated: 2025-12-09T15:10:35.359Z

Reserved: 2025-12-08T21:19:11.206Z

Link: CVE-2025-67504

cve-icon Vulnrichment

Updated: 2025-12-09T15:10:22.623Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-09T16:18:24.237

Modified: 2025-12-11T15:52:28.497

Link: CVE-2025-67504

cve-icon Redhat

No data.