Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 19 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
S9y
S9y serendipity |
|
| CPEs | cpe:2.3:a:s9y:serendipity:2.5.0:*:*:*:*:*:*:* | |
| Vendors & Products |
S9y
S9y serendipity |
|
| Metrics |
cvssV3_1
|
Thu, 11 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Serendipity
Serendipity serendipity |
|
| Vendors & Products |
Serendipity
Serendipity serendipity |
Wed, 10 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Serendipity 2.5.0 contains a remote code execution vulnerability that allows authenticated administrators to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload mechanism by creating a PHP shell with a command execution form that enables arbitrary system command execution on the web server. | |
| Title | Serendipity 2.5.0 Remote Code Execution via Authenticated Media Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-05T12:03:31.492Z
Reserved: 2025-12-10T14:35:24.455Z
Link: CVE-2024-58282
Updated: 2025-12-11T15:46:22.427Z
Status : Analyzed
Published: 2025-12-10T22:16:20.100
Modified: 2025-12-19T17:46:31.773
Link: CVE-2024-58282
No data.
OpenCVE Enrichment
Updated: 2025-12-11T15:16:53Z