CVE-2023-53942

File Thingie 2.5.7 contains an authenticated file upload vulnerability that allows remote attackers to upload malicious PHP zip archives to the web server. Attackers can create a custom PHP payload, upload and unzip it, and then execute arbitrary system commands through a crafted PHP script with a command parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:leefish:file_thingie:2.5.7:*:*:*:*:*:*:*

History

31 Dec 2025, 17:22

Type Values Removed Values Added
References () https://github.com/leefish/filethingie - () https://github.com/leefish/filethingie - Product
References () https://www.exploit-db.com/exploits/51436 - () https://www.exploit-db.com/exploits/51436 - Exploit, Third Party Advisory
References () https://www.vulncheck.com/advisories/file-thingie-authenticated-arbitrary-file-upload-remote-code-execution - () https://www.vulncheck.com/advisories/file-thingie-authenticated-arbitrary-file-upload-remote-code-execution - Third Party Advisory
First Time Leefish
Leefish file Thingie
CPE cpe:2.3:a:leefish:file_thingie:2.5.7:*:*:*:*:*:*:*

18 Dec 2025, 22:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51436 - () https://www.exploit-db.com/exploits/51436 -

18 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 20:15

Updated : 2025-12-31 17:22


NVD link : CVE-2023-53942

Mitre link : CVE-2023-53942

CVE.ORG link : CVE-2023-53942


JSON object : View

Products Affected

leefish

  • file_thingie
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type