Description
In Wcms 0.3.2, an attacker can send a crafted request from a vulnerable web application backend server /wcms/wex/html.php via the finish parameter and the textAreaCode parameter. It can write arbitrary strings into custom file names and upload any files, and write malicious code to execute scripts to trigger command execution.
References (1)
Core 1
Core References
Exploit, Issue Tracking
https://github.com/vedees/wcms/issues/15
Scores
CVSS v3
9.8
EPSS
0.0585
EPSS Percentile
90.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (1)
wcms/wcms
0.3.2
Published
May 22, 2023
Tracked Since
Feb 18, 2026