# Exploit Title: WBCE CMS 1.6.4 - Stored Cross-Site Scripting (XSS) # Date: 2025-10-29 # Exploit Author: Chokri Hammedi # Vendor Homepage: https://wbce.org/ # Software Link: https://github.com/WBCE/WBCE_CMS/releases/tag/v1.6.4 # Version: 1.6.4 # Tested on: Linux (Debian/Parrot OS) ## Vulnerability Description WBCE CMS version 1.6.4 contains a stored Cross-Site Scripting (XSS) vulnerability in the Droplets module. Authenticated attackers with administrator privileges can inject and execute arbitrary JavaScript code. ## Proof of Concept 1. Log in to the WBCE admin panel with administrator credentials 2. Navigate to "Admin-Tools" in the sidebar menu 3. Click on "Droplets" to access the droplet management interface 4. Click "Add droplet" to create a new droplet 5. Enter a random name for the droplet and insert the following XSS payload in the code area: echo ""; 6. Click "Save & Back" to store the droplet 7. Copy the droplet code name (e.g., `[[test]]`) from the droplets list. You can find this under the description column by clicking the info icon. 8. Edit or create any page and insert the droplet code name within double brackets 9. View the page to see the XSS payload execute automatically