Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
References
| Link | Resource |
|---|---|
| https://web.archive.org/web/20080616153330/http://zomp.nl/zomplog/ | Product |
| https://www.exploit-db.com/exploits/51624 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/zomplog-remote-code-execution-via-authenticated-file-manipulation | Third Party Advisory Exploit |
| https://www.exploit-db.com/exploits/51624 | Exploit Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2025-12-15 21:15
Updated : 2025-12-24 18:11
NVD link : CVE-2023-53888
Mitre link : CVE-2023-53888
CVE.ORG link : CVE-2023-53888
JSON object : View
Products Affected
zomp
- zomplog
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
