Serendipity 2.5.0 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload mechanism by creating a PHP shell with a command execution form that enables arbitrary system command execution on the web server.
References
| Link | Resource |
|---|---|
| https://docs.s9y.org/ | Product |
| https://www.exploit-db.com/exploits/52036 | Exploit Third Party Advisory |
| https://www.s9y.org/latest | Product |
| https://www.vulncheck.com/advisories/serendipity-remote-code-execution-via-authenticated-media-upload | Third Party Advisory |
| https://www.s9y.org/latest | Product |
Configurations
History
19 Dec 2025, 17:46
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:s9y:serendipity:2.5.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
| First Time |
S9y serendipity
S9y |
|
| References | () https://docs.s9y.org/ - Product | |
| References | () https://www.exploit-db.com/exploits/52036 - Exploit, Third Party Advisory | |
| References | () https://www.s9y.org/latest - Product | |
| References | () https://www.vulncheck.com/advisories/serendipity-remote-code-execution-via-authenticated-media-upload - Third Party Advisory |
11 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.s9y.org/latest - |
10 Dec 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 22:16
Updated : 2025-12-19 17:46
NVD link : CVE-2024-58282
Mitre link : CVE-2024-58282
CVE.ORG link : CVE-2024-58282
JSON object : View
Products Affected
s9y
- serendipity
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
