CVE-2023-53971

WebTareas 2.4 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the chat photo upload functionality. Attackers can upload a PHP file with arbitrary code to the /files/Messages/ directory and execute it directly through the generated file path.
Configurations

Configuration 1 (hide)

cpe:2.3:a:webtareas_project:webtareas:2.4:-:*:*:*:*:*:*

History

26 Dec 2025, 17:24

Type Values Removed Values Added
First Time Webtareas Project webtareas
Webtareas Project
References () https://sourceforge.net/projects/webtareas/ - () https://sourceforge.net/projects/webtareas/ - Product
References () https://www.exploit-db.com/exploits/51089 - () https://www.exploit-db.com/exploits/51089 - Exploit
References () https://www.vulncheck.com/advisories/webtareas-authenticated-remote-code-execution-via-file-upload - () https://www.vulncheck.com/advisories/webtareas-authenticated-remote-code-execution-via-file-upload - Third Party Advisory
CPE cpe:2.3:a:webtareas_project:webtareas:2.4:-:*:*:*:*:*:*

22 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-22 22:16

Updated : 2025-12-26 17:24


NVD link : CVE-2023-53971

Mitre link : CVE-2023-53971

CVE.ORG link : CVE-2023-53971


JSON object : View

Products Affected

webtareas_project

  • webtareas
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type