WebTareas 2.4 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the chat photo upload functionality. Attackers can upload a PHP file with arbitrary code to the /files/Messages/ directory and execute it directly through the generated file path.
References
| Link | Resource |
|---|---|
| https://sourceforge.net/projects/webtareas/ | Product |
| https://www.exploit-db.com/exploits/51089 | Exploit |
| https://www.vulncheck.com/advisories/webtareas-authenticated-remote-code-execution-via-file-upload | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-22 22:16
Updated : 2025-12-26 17:24
NVD link : CVE-2023-53971
Mitre link : CVE-2023-53971
CVE.ORG link : CVE-2023-53971
JSON object : View
Products Affected
webtareas_project
- webtareas
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
