WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
Metrics
Affected Vendors & Products
References
History
Sat, 16 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Webidsupport
Webidsupport webid |
|
Vendors & Products |
Webidsupport
Webidsupport webid |
Thu, 14 Aug 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 13 Aug 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application. | |
Title | WeBid 1.0.2 converter.php Remote PHP Code Injection | |
Weaknesses | CWE-94 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-13T20:55:07.652Z
Updated: 2025-08-14T14:51:36.611Z
Reserved: 2025-08-11T19:11:34.638Z
Link: CVE-2011-10011

Updated: 2025-08-14T13:44:02.309Z

Status : Awaiting Analysis
Published: 2025-08-13T21:15:28.293
Modified: 2025-08-14T15:15:29.967
Link: CVE-2011-10011

No data.