Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
References
| Link | Resource |
|---|---|
| https://webutler.de/en | Product |
| https://www.exploit-db.com/exploits/51660 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/webutler-v-remote-code-execution-via-arbitrary-file-upload | Third Party Advisory |
| https://www.exploit-db.com/exploits/51660 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-15 21:15
Updated : 2025-12-18 21:43
NVD link : CVE-2023-53885
Mitre link : CVE-2023-53885
CVE.ORG link : CVE-2023-53885
JSON object : View
Products Affected
webutler
- webutler
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
