Serendipity 2.5.0 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload mechanism by creating a PHP shell with a command execution form that enables arbitrary system command execution on the web server.
References
| Link | Resource |
|---|---|
| https://docs.s9y.org/ | Product |
| https://www.exploit-db.com/exploits/52036 | Exploit Third Party Advisory |
| https://www.s9y.org/latest | Product |
| https://www.vulncheck.com/advisories/serendipity-remote-code-execution-via-authenticated-media-upload | Third Party Advisory |
| https://www.s9y.org/latest | Product |
Configurations
History
No history.
Information
Published : 2025-12-10 22:16
Updated : 2025-12-19 17:46
NVD link : CVE-2024-58282
Mitre link : CVE-2024-58282
CVE.ORG link : CVE-2024-58282
JSON object : View
Products Affected
s9y
- serendipity
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
