WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5.
Metrics
Affected Vendors & Products
References
History
Thu, 11 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:wbce:wbce_cms:*:*:*:*:*:*:*:* |
Tue, 09 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wbce
Wbce wbce Cms |
|
| Vendors & Products |
Wbce
Wbce wbce Cms |
Tue, 09 Dec 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WBCE CMS is a content management system. Versions 1.6.4 and below use function GenerateRandomPassword() to create passwords using PHP's rand(). rand() is not cryptographically secure, which allows password sequences to be predicted or brute-forced. This can lead to user account compromise or privilege escalation if these passwords are used for new accounts or password resets. The vulnerability is fixed in version 1.6.5. | |
| Title | WBCE CMS has Weak Random Number Generator in Password Generation Function | |
| Weaknesses | CWE-331 CWE-338 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-12-09T03:31:17.723Z
Updated: 2025-12-09T15:10:35.359Z
Reserved: 2025-12-08T21:19:11.206Z
Link: CVE-2025-67504
Updated: 2025-12-09T15:10:22.623Z
Status : Analyzed
Published: 2025-12-09T16:18:24.237
Modified: 2025-12-11T15:52:28.497
Link: CVE-2025-67504
No data.