Home

Description

Dotclear 2.25.3 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension through the blog post creation interface. Attackers can upload files containing PHP system commands that execute when the uploaded file is accessed, enabling arbitrary code execution on the server.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-19 | Updated 2025-12-19 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Unrestricted Upload of File with Dangerous Type

Product status

2.25.3
affected

Credits

Mirabbas Ağalarov finder

References

www.exploit-db.com/exploits/51353 (ExploitDB-51353) exploit

dotclear.org/ (Official Product Homepage) technical-description

www.vulncheck.com/...d-remote-code-execution-via-file-upload (VulnCheck Advisory: Dotclear 2.25.3 Authenticated Remote Code Execution via File Upload) third-party-advisory

cve.org (CVE-2023-53952)

nvd.nist.gov (CVE-2023-53952)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.