Predictable Password Generation in WBCE CMS Affects User Security
CVE-2025-67504
9.1CRITICAL
What is CVE-2025-67504?
WBCE CMS versions up to 1.6.4 utilize a function for password generation that relies on PHP's rand(), which is not cryptographically secure. This flaw allows for the potential prediction or brute-forcing of password sequences, increasing the risk of user account compromises and privilege escalation. Users are advised to upgrade to version 1.6.5, where this vulnerability has been addressed, ensuring improved security for account management.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
WBCE_CMS < 1.6.5
References
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
