CVE-2011-10011
WeBid 1.0.2 converter.php Remote PHP Code Injection
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application.
| CWE | CWE-94 |
| Vendor | webid |
| Product | webid |
| Published | Aug 13, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for webid webid
Be the first to know when new unknown vulnerabilities affecting webid webid are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
WeBid / WeBid
* โค 1.0.2
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb exploit-db.com: https://www.exploit-db.com/exploits/17487 exploit-db.com: https://www.exploit-db.com/exploits/18934 web.archive.org: https://web.archive.org/web/20121024110058/http://www.webidsupport.com/forums/showthread.php?3892 sourceforge.net: https://sourceforge.net/projects/simpleauction/ vulncheck.com: https://www.vulncheck.com/advisories/webid-remote-php-code-injection
Credits
EgiX