CVE-2023-53933

Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:s9y:serendipity:2.4.0:-:*:*:*:*:*:*

History

24 Dec 2025, 16:52

Type Values Removed Values Added
References () https://docs.s9y.org/ - () https://docs.s9y.org/ - Product
References () https://www.exploit-db.com/exploits/51372 - () https://www.exploit-db.com/exploits/51372 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/serendipity-authenticated-remote-code-execution-via-file-upload - () https://www.vulncheck.com/advisories/serendipity-authenticated-remote-code-execution-via-file-upload - Third Party Advisory, Exploit
First Time S9y serendipity
S9y
CPE cpe:2.3:a:s9y:serendipity:2.4.0:-:*:*:*:*:*:*

18 Dec 2025, 19:16

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51372 - () https://www.exploit-db.com/exploits/51372 -

17 Dec 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-17 23:15

Updated : 2025-12-24 16:52


NVD link : CVE-2023-53933

Mitre link : CVE-2023-53933

CVE.ORG link : CVE-2023-53933


JSON object : View

Products Affected

s9y

  • serendipity
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type