Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 15 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 15 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application. | |
| Title | Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-12-15T21:46:37.310Z
Reserved: 2025-12-15T01:02:32.434Z
Link: CVE-2023-53888
Updated: 2025-12-15T21:37:44.284Z
Status : Received
Published: 2025-12-15T21:15:51.973
Modified: 2025-12-15T22:15:46.800
Link: CVE-2023-53888
No data.
OpenCVE Enrichment
No data.