CVE-2025-67504
WBCE · WBCE CMS is a content management Multiple Products
A critical vulnerability has been identified in WBCE CMS versions 1.6.4 and below, rated with a CVSS score of 9.1.
Executive summary
A critical vulnerability has been identified in WBCE CMS versions 1.6.4 and below, rated with a CVSS score of 9.1. The system uses a weak, predictable method for generating passwords, which could allow an attacker to guess or brute-force user passwords. Successful exploitation could lead to unauthorized account access, potentially granting an attacker administrative control over the content management system.
Vulnerability
The GenerateRandomPassword() function within the WBCE CMS relies on PHP's rand() function, which is a non-cryptographically secure pseudo-random number generator (PRNG). The output of rand() is predictable; an attacker who can observe some generated passwords or understand the state of the server's PRNG seed may be able to predict the entire sequence of subsequent passwords. An attacker could exploit this by requesting multiple password resets or creating new accounts to analyze the pattern, eventually allowing them to predict a valid password for a targeted account and gain unauthorized access.
Business impact
This vulnerability is of critical severity with a CVSS score of 9.1. Exploitation could lead to the complete compromise of user and administrator accounts within the WBCE CMS. The potential business impact includes data breaches of sensitive user information, unauthorized modification or deletion of website content, website defacement, and the potential for the compromised server to be used as a foothold for further attacks into the corporate network. Reputational damage and loss of customer trust are significant risks associated with a public-facing system compromise.
Remediation
Immediate Action: Organizations must immediately update all instances of WBCE CMS to the patched version 1.6.5 or a later release. After updating, it is crucial to monitor for any signs of exploitation attempts by reviewing server and application access logs for unusual login patterns or password reset requests.
Proactive Monitoring: Security teams should monitor for high volumes of failed login attempts, particularly if followed by a successful login from the same IP address. Scrutinize logs related to the account creation and password reset functionalities for anomalous or repetitive requests. A sudden spike in new user registrations or password changes should be investigated as a potential indicator of compromise.
Compensating Controls: If immediate patching is not feasible, implement multi-factor authentication (MFA) for all accounts, especially those with administrative privileges. Enforce a strict password policy that requires users to immediately change any system-generated passwords to a strong, unique one. A Web Application Firewall (WAF) can be configured to rate-limit or block suspicious activity targeting login and password reset pages.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.1 and the high potential for full system compromise, this vulnerability poses a significant risk to the organization. Although it is not currently listed on the CISA KEV list, we strongly recommend that immediate action be taken. The primary and most effective remediation is to apply the vendor-supplied update to version 1.6.5 across all affected systems without delay.