Description
Dotclear 2.25.3 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension through the blog post creation interface. Attackers can upload files containing PHP system commands that execute when the uploaded file is accessed, enabling arbitrary code execution on the server.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Mirabbas Ağalarov
References
www.exploit-db.com/exploits/51353 (ExploitDB-51353)
dotclear.org/ (Official Product Homepage)
www.vulncheck.com/...d-remote-code-execution-via-file-upload (VulnCheck Advisory: Dotclear 2.25.3 Authenticated Remote Code Execution via File Upload)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.