WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
History

Sat, 16 Aug 2025 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Webidsupport
Webidsupport webid
Vendors & Products Webidsupport
Webidsupport webid

Thu, 14 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 21:00:00 +0000

Type Values Removed Values Added
Description WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
Title WeBid 1.0.2 converter.php Remote PHP Code Injection
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-08-13T20:55:07.652Z

Updated: 2025-08-14T14:51:36.611Z

Reserved: 2025-08-11T19:11:34.638Z

Link: CVE-2011-10011

cve-icon Vulnrichment

Updated: 2025-08-14T13:44:02.309Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-13T21:15:28.293

Modified: 2025-08-14T15:15:29.967

Link: CVE-2011-10011

cve-icon Redhat

No data.