CVE-2023-53885

Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webutler:webutler:3.2:*:*:*:*:*:*:*

History

18 Dec 2025, 21:43

Type Values Removed Values Added
First Time Webutler
Webutler webutler
References () https://webutler.de/en - () https://webutler.de/en - Product
References () https://www.exploit-db.com/exploits/51660 - () https://www.exploit-db.com/exploits/51660 - Exploit, Third Party Advisory
References () https://www.vulncheck.com/advisories/webutler-v-remote-code-execution-via-arbitrary-file-upload - () https://www.vulncheck.com/advisories/webutler-v-remote-code-execution-via-arbitrary-file-upload - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:a:webutler:webutler:3.2:*:*:*:*:*:*:*

15 Dec 2025, 22:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51660 - () https://www.exploit-db.com/exploits/51660 -

15 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-15 21:15

Updated : 2025-12-18 21:43


NVD link : CVE-2023-53885

Mitre link : CVE-2023-53885

CVE.ORG link : CVE-2023-53885


JSON object : View

Products Affected

webutler

  • webutler
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type