Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
History

Tue, 16 Dec 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
Title Webutler v3.2 Remote Code Execution via Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-15T21:46:54.004Z

Reserved: 2025-12-13T14:25:05.000Z

Link: CVE-2023-53885

cve-icon Vulnrichment

Updated: 2025-12-15T21:38:08.919Z

cve-icon NVD

Status : Received

Published: 2025-12-15T21:15:51.553

Modified: 2025-12-15T22:15:46.480

Link: CVE-2023-53885

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.