Dotclear 2.25.3 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension through the blog post creation interface. Attackers can upload files containing PHP system commands that execute when the uploaded file is accessed, enabling arbitrary code execution on the server.
References
| Link | Resource |
|---|---|
| https://dotclear.org/ | Product |
| https://www.exploit-db.com/exploits/51353 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/dotclear-authenticated-remote-code-execution-via-file-upload | Third Party Advisory Exploit |
Configurations
History
24 Dec 2025, 16:57
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dotclear:dotclear:2.25.3:*:*:*:*:*:*:* | |
| First Time |
Dotclear
Dotclear dotclear |
|
| References | () https://dotclear.org/ - Product | |
| References | () https://www.exploit-db.com/exploits/51353 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.vulncheck.com/advisories/dotclear-authenticated-remote-code-execution-via-file-upload - Third Party Advisory, Exploit |
19 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-19 21:15
Updated : 2025-12-24 16:57
NVD link : CVE-2023-53952
Mitre link : CVE-2023-53952
CVE.ORG link : CVE-2023-53952
JSON object : View
Products Affected
dotclear
- dotclear
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
