8.8
CVSSv3

CVE-2023-2453

Published: 05/09/2023 Updated: 08/09/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php-fusion phpfusion

Github Repositories

gg0h Vulnerability Analysis | Web Developer | OSCP | OSWE โ—๏ธ Preparing for OSED ๐Ÿ Python Enthusiast ๐Ÿ’ฌ How to reach me: Twitter CVEs: CVE-2023-25828 RCE in Pluck CMS via web-shell smuggling in JPEG CVE-2023-2453 RCE in PHPFusion via LFI on arbitrary 'php' file CVE-2023-51448 Blind SQL injection