Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
References
| Link | Resource |
|---|---|
| https://web.archive.org/web/20080616153330/http://zomp.nl/zomplog/ | Product |
| https://www.exploit-db.com/exploits/51624 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/zomplog-remote-code-execution-via-authenticated-file-manipulation | Third Party Advisory Exploit |
| https://www.exploit-db.com/exploits/51624 | Exploit Third Party Advisory VDB Entry |
Configurations
History
24 Dec 2025, 18:11
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Zomp zomplog
Zomp |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:zomp:zomplog:3.9:*:*:*:*:*:*:* | |
| References | () https://web.archive.org/web/20080616153330/http://zomp.nl/zomplog/ - Product | |
| References | () https://www.exploit-db.com/exploits/51624 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/zomplog-remote-code-execution-via-authenticated-file-manipulation - Third Party Advisory, Exploit |
15 Dec 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/51624 - |
15 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-15 21:15
Updated : 2025-12-24 18:11
NVD link : CVE-2023-53888
Mitre link : CVE-2023-53888
CVE.ORG link : CVE-2023-53888
JSON object : View
Products Affected
zomp
- zomplog
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
