Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
S9y
S9y serendipity |
|
| Vendors & Products |
S9y
S9y serendipity |
Wed, 17 Dec 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Serendipity 2.4.0 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files with .phar extension. Attackers can upload files with system command payloads to the media upload endpoint and execute arbitrary commands on the server. | |
| Title | Serendipity 2.4.0 Authenticated Remote Code Execution via File Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-17T22:44:59.632Z
Updated: 2025-12-18T18:54:23.264Z
Reserved: 2025-12-16T19:22:09.997Z
Link: CVE-2023-53933
Updated: 2025-12-18T18:49:31.645Z
Status : Undergoing Analysis
Published: 2025-12-17T23:15:52.973
Modified: 2025-12-18T19:16:20.433
Link: CVE-2023-53933
No data.