Security for everyone

CVE-2023-39796 Scanner

Detects 'SQL Injection' vulnerability in WBCE CMS affects v. 1.6.0


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2023-39796 Scanner Detail

WBCE CMS is a content management system designed to provide an easy-to-use platform for web administrators and developers. It incorporates various modules to extend its functionality, with the Miniform module being one of these default components. This software is widely used for building and managing websites, offering a flexible and customizable experience. It caters to users who require a reliable system for content management and website development. The Miniform module, in particular, enhances the CMS's functionality by allowing the creation of custom forms for different purposes.

The vulnerability discovered in WBCE CMS's Miniform module is a SQL Injection (SQLi) flaw. This critical security issue allows attackers to execute arbitrary SQL commands through the application's user interface without proper authentication. It poses a significant risk as it can lead to unauthorized access to the database, data theft, or even complete control over the affected website. The vulnerability is present due to insufficient input validation on user-supplied data.

Specifically, the vulnerability is found in the /modules/miniform/ajax_delete_message.php file of the Miniform module. The issue arises from a lack of authentication checks and improper handling of input data in a DELETE query. An attacker can exploit this by manipulating the input parameters to inject SQL commands, enabling them to modify or delete database entries, or potentially gain unauthorized access to sensitive information stored in the database. This flaw represents a significant security risk that requires immediate attention.

If exploited, this vulnerability can have severe consequences, including unauthorized access to the database, exposure of sensitive data, and the potential for an attacker to gain administrative access to the CMS. It could lead to data theft, website defacement, and in some cases, complete control over the website's infrastructure. The impact extends beyond data loss, affecting the integrity and availability of the website, and potentially damaging the reputation of the organization using the vulnerable software.

By joining the securityforeveryone platform, users gain access to comprehensive security scanning capabilities that can identify vulnerabilities like the one found in WBCE CMS. Our platform offers detailed reports, insights, and actionable recommendations to address identified issues. Membership provides peace of mind through regular scans, early detection of new vulnerabilities, and guidance on securing digital assets effectively. Embrace the benefits of enhanced cyber security posture and proactive vulnerability management with securityforeveryone.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture