CVE-2011-10011

WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
CVSS

No CVSS.

Configurations

No configuration.

History

14 Aug 2025, 15:15

Type Values Removed Values Added
References () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb - () https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb -

14 Aug 2025, 13:11

Type Values Removed Values Added
Summary
  • (es) WeBid 1.0.2 contiene una vulnerabilidad de inyección remota de código en el script convert.php, donde la entrada no depurada del parámetro "to" de una solicitud POST se escribe directamente en el archivo "includes/currencies.php". Esto permite a atacantes no autenticados inyectar código PHP arbitrario, lo que resulta en la ejecución remota persistente de código cuando la aplicación accede o incluye el script modificado.

13 Aug 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-13 21:15

Updated : 2025-08-14 15:15


NVD link : CVE-2011-10011

Mitre link : CVE-2011-10011

CVE.ORG link : CVE-2011-10011


JSON object : View

Products Affected

No product.

CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')