Dotclear 2.29 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload process by crafting a PHP shell with a command execution form to gain system access through the uploaded file.
References
| Link | Resource |
|---|---|
| https://git.dotclear.org/explore/repos | Broken Link |
| https://github.com/dotclear/dotclear/archive/refs/heads/master.zip | Product |
| https://www.exploit-db.com/exploits/52037 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/dotclear-remote-code-execution-via-authenticated-file-upload | Third Party Advisory |
| https://github.com/dotclear/dotclear/archive/refs/heads/master.zip | Product |
Configurations
History
No history.
Information
Published : 2025-12-10 22:16
Updated : 2025-12-19 17:50
NVD link : CVE-2024-58281
Mitre link : CVE-2024-58281
CVE.ORG link : CVE-2024-58281
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
