Cyber Posture

CVE-2022-50936

HighPublic PoC

Published: 13 January 2026

Published
13 January 2026
Modified
20 January 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0115 78.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-50936 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Wbce Wbce Cms. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 21.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates unrestricted upload of dangerous file types by validating ZIP payloads and contents to block malicious PHP code execution.

preventdetect

Deploys malicious code protection at upload entry points to scan and eradicate crafted ZIP files containing arbitrary PHP code.

prevent

Enforces least privilege to restrict low-privilege authenticated users from accessing the vulnerable droplet upload functionality in the admin panel.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Authenticated RCE via unrestricted dangerous file upload in public-facing CMS admin panel directly enables exploitation of public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

WBCE CMS version 1.5.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious droplets through the admin panel. Authenticated attackers can exploit the droplet upload functionality in the admin tools to create and execute arbitrary PHP…

more

code by crafting a specially designed zip file payload.

Deeper analysisAI

CVE-2022-50936 is an authenticated remote code execution vulnerability affecting WBCE CMS version 1.5.2, with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). The flaw, tied to CWE-434 (Unrestricted Upload of File with Dangerous Type), resides in the droplet upload functionality within the admin tools. Attackers can upload specially crafted ZIP file payloads through the admin panel to create and execute arbitrary PHP code.

Authenticated attackers with low privileges (PR:L) can exploit this vulnerability remotely over the network with low complexity and no user interaction required. Successful exploitation grants high-impact control over confidentiality, integrity, and availability, enabling full remote code execution on the server.

References include advisories from VulnCheck detailing the remote code execution, an Exploit-DB entry (50707) with a public proof-of-concept, and official WBCE CMS resources such as the GitHub repository, homepage, and downloads page, which security practitioners should consult for any available patches or updates.

Details

CWE(s)

Affected Products

wbce
wbce cms
1.5.2

CVEs Like This One

CVE-2024-58283Same product: Wbce Wbce Cms
CVE-2025-34506Same product: Wbce Wbce Cms
CVE-2025-66204Same product: Wbce Wbce Cms
CVE-2025-54440Shared CWE-434
CVE-2024-56828Shared CWE-434
CVE-2025-34299Shared CWE-434
CVE-2025-12673Shared CWE-434
CVE-2025-13067Shared CWE-434
CVE-2026-3459Shared CWE-434
CVE-2025-48396Shared CWE-434

References