CVE-2025-13786

A vulnerability was detected in taosir WTCMS up to 01a5f68a3dfc2fdddb44eed967bb2d4f60487665. Impacted is the function fetch of the file /index.php. Performing manipulation of the argument content results in code injection. It is possible to initiate the attack remotely. The exploit is now public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Configurations

No configuration.

History

01 Dec 2025, 21:15

Type Values Removed Values Added
References () https://github.com/TiKi-r/CVE-Report/blob/main/WtcmsRCE.md - () https://github.com/TiKi-r/CVE-Report/blob/main/WtcmsRCE.md -
References () https://github.com/TiKi-r/CVE-Report/blob/main/WtcmsRCE.md#3-proof-of-concept-poc - () https://github.com/TiKi-r/CVE-Report/blob/main/WtcmsRCE.md#3-proof-of-concept-poc -

30 Nov 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-30 09:15

Updated : 2025-12-01 21:15


NVD link : CVE-2025-13786

Mitre link : CVE-2025-13786

CVE.ORG link : CVE-2025-13786


JSON object : View

Products Affected

No product.

CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')