CVE-2022-50936
Published: 13 January 2026
Summary
CVE-2022-50936 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wbce Wbce Cms. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and AC-6 (Least Privilege).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates unrestricted upload of dangerous file types by validating ZIP payloads and contents to block malicious PHP code execution.
Deploys malicious code protection at upload entry points to scan and eradicate crafted ZIP files containing arbitrary PHP code.
Enforces least privilege to restrict low-privilege authenticated users from accessing the vulnerable droplet upload functionality in the admin panel.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated RCE via unrestricted dangerous file upload in public-facing CMS admin panel directly enables exploitation of public-facing application.
NVD Description
WBCE CMS version 1.5.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious droplets through the admin panel. Authenticated attackers can exploit the droplet upload functionality in the admin tools to create and execute arbitrary PHP…
more
code by crafting a specially designed zip file payload.
Deeper analysisAI
CVE-2022-50936 is an authenticated remote code execution vulnerability affecting WBCE CMS version 1.5.2, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw, tied to CWE-434 (Unrestricted Upload of File with Dangerous Type), resides in the droplet upload functionality within the admin tools. Attackers can upload specially crafted ZIP file payloads through the admin panel to create and execute arbitrary PHP code.
Authenticated attackers with low privileges (PR:L) can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants high-impact control over confidentiality, integrity, and availability, enabling full remote code execution on the server.
References include advisories from VulnCheck detailing the remote code execution, an Exploit-DB entry (50707) with a public proof-of-concept, and official WBCE CMS resources such as the GitHub repository, homepage, and downloads page, which security practitioners should consult for any available patches or updates.
Details
- CWE(s)