File Thingie 2.5.7 contains an authenticated file upload vulnerability that allows remote attackers to upload malicious PHP zip archives to the web server. Attackers can create a custom PHP payload, upload and unzip it, and then execute arbitrary system commands through a crafted PHP script with a command parameter.
References
| Link | Resource |
|---|---|
| https://github.com/leefish/filethingie | Product |
| https://www.exploit-db.com/exploits/51436 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/file-thingie-authenticated-arbitrary-file-upload-remote-code-execution | Third Party Advisory |
| https://www.exploit-db.com/exploits/51436 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-18 20:15
Updated : 2025-12-31 17:22
NVD link : CVE-2023-53942
Mitre link : CVE-2023-53942
CVE.ORG link : CVE-2023-53942
JSON object : View
Products Affected
leefish
- file_thingie
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
