CVE-2024-58282

Serendipity 2.5.0 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload mechanism by creating a PHP shell with a command execution form that enables arbitrary system command execution on the web server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:s9y:serendipity:2.5.0:*:*:*:*:*:*:*

History

19 Dec 2025, 17:46

Type Values Removed Values Added
CPE cpe:2.3:a:s9y:serendipity:2.5.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time S9y serendipity
S9y
References () https://docs.s9y.org/ - () https://docs.s9y.org/ - Product
References () https://www.exploit-db.com/exploits/52036 - () https://www.exploit-db.com/exploits/52036 - Exploit, Third Party Advisory
References () https://www.s9y.org/latest - () https://www.s9y.org/latest - Product
References () https://www.vulncheck.com/advisories/serendipity-remote-code-execution-via-authenticated-media-upload - () https://www.vulncheck.com/advisories/serendipity-remote-code-execution-via-authenticated-media-upload - Third Party Advisory

11 Dec 2025, 19:15

Type Values Removed Values Added
References () https://www.s9y.org/latest - () https://www.s9y.org/latest -

10 Dec 2025, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-10 22:16

Updated : 2025-12-19 17:46


NVD link : CVE-2024-58282

Mitre link : CVE-2024-58282

CVE.ORG link : CVE-2024-58282


JSON object : View

Products Affected

s9y

  • serendipity
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type