CVE-2019-17575

HIGH

WBCE CMS <1.4.0 - Command Injection

Title source: llm
STIX 2.1

Description

A file-rename filter bypass exists in admin/media/rename.php in WBCE CMS 1.4.0 and earlier. This can be exploited by an authenticated user with admin privileges to rename a media filename and extension. (For example: place PHP code in a .jpg file, and then change the file's base name to filename.ph and change the file's extension to p. Because of concatenation, the name is then treated as filename.php.) At the result, remote attackers can execute arbitrary PHP code.

Scores

CVSS v3 7.2
EPSS 0.0025
EPSS Percentile 48.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-706
Status published
Products (1)
wbce/wbce_cms < 1.4.0
Published Oct 14, 2019
Tracked Since Feb 18, 2026