CVE-2023-53952

Dotclear 2.25.3 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension through the blog post creation interface. Attackers can upload files containing PHP system commands that execute when the uploaded file is accessed, enabling arbitrary code execution on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dotclear:dotclear:2.25.3:*:*:*:*:*:*:*

History

24 Dec 2025, 16:57

Type Values Removed Values Added
CPE cpe:2.3:a:dotclear:dotclear:2.25.3:*:*:*:*:*:*:*
First Time Dotclear
Dotclear dotclear
References () https://dotclear.org/ - () https://dotclear.org/ - Product
References () https://www.exploit-db.com/exploits/51353 - () https://www.exploit-db.com/exploits/51353 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/dotclear-authenticated-remote-code-execution-via-file-upload - () https://www.vulncheck.com/advisories/dotclear-authenticated-remote-code-execution-via-file-upload - Third Party Advisory, Exploit

19 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-19 21:15

Updated : 2025-12-24 16:57


NVD link : CVE-2023-53952

Mitre link : CVE-2023-53952

CVE.ORG link : CVE-2023-53952


JSON object : View

Products Affected

dotclear

  • dotclear
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type