WebTareas 2.4 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the chat photo upload functionality. Attackers can upload a PHP file with arbitrary code to the /files/Messages/ directory and execute it directly through the generated file path.
References
| Link | Resource |
|---|---|
| https://sourceforge.net/projects/webtareas/ | Product |
| https://www.exploit-db.com/exploits/51089 | Exploit |
| https://www.vulncheck.com/advisories/webtareas-authenticated-remote-code-execution-via-file-upload | Third Party Advisory |
Configurations
History
26 Dec 2025, 17:24
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Webtareas Project webtareas
Webtareas Project |
|
| References | () https://sourceforge.net/projects/webtareas/ - Product | |
| References | () https://www.exploit-db.com/exploits/51089 - Exploit | |
| References | () https://www.vulncheck.com/advisories/webtareas-authenticated-remote-code-execution-via-file-upload - Third Party Advisory | |
| CPE | cpe:2.3:a:webtareas_project:webtareas:2.4:-:*:*:*:*:*:* |
22 Dec 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-22 22:16
Updated : 2025-12-26 17:24
NVD link : CVE-2023-53971
Mitre link : CVE-2023-53971
CVE.ORG link : CVE-2023-53971
JSON object : View
Products Affected
webtareas_project
- webtareas
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
