Cyber Posture

CVE-2022-50936

HighPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
20 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0089 75.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

WBCE CMS version 1.5.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious droplets through the admin panel. Authenticated attackers can exploit the droplet upload functionality in the admin tools to create and execute arbitrary PHP…

more

code by crafting a specially designed zip file payload.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates unrestricted upload of dangerous file types by validating ZIP payloads and contents to block malicious PHP code execution.

preventdetect

Deploys malicious code protection at upload entry points to scan and eradicate crafted ZIP files containing arbitrary PHP code.

prevent

Enforces least privilege to restrict low-privilege authenticated users from accessing the vulnerable droplet upload functionality in the admin panel.

Security SummaryAI

CVE-2022-50936 is an authenticated remote code execution vulnerability affecting WBCE CMS version 1.5.2, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw, tied to CWE-434 (Unrestricted Upload of File with Dangerous Type), resides in the droplet upload functionality within the admin tools. Attackers can upload specially crafted ZIP file payloads through the admin panel to create and execute arbitrary PHP code.

Authenticated attackers with low privileges (PR:L) can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants high-impact control over confidentiality, integrity, and availability, enabling full remote code execution on the server.

References include advisories from VulnCheck detailing the remote code execution, an Exploit-DB entry (50707) with a public proof-of-concept, and official WBCE CMS resources such as the GitHub repository, homepage, and downloads page, which security practitioners should consult for any available patches or updates.

Details

CWE(s)

Affected Products

wbce
wbce cms
1.5.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authenticated RCE via unrestricted dangerous file upload in public-facing CMS admin panel directly enables exploitation of public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References