Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
History

Tue, 16 Dec 2025 09:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description Webutler v3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload PHP files with system command execution. Attackers can upload a PHAR file with embedded system commands to the media browser and execute arbitrary commands by accessing the uploaded file.
Title Webutler v3.2 Remote Code Execution via Arbitrary File Upload
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-15T20:28:21.367Z

Updated: 2025-12-15T21:46:54.004Z

Reserved: 2025-12-13T14:25:05.000Z

Link: CVE-2023-53885

cve-icon Vulnrichment

Updated: 2025-12-15T21:38:08.919Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-15T21:15:51.553

Modified: 2025-12-16T14:10:11.300

Link: CVE-2023-53885

cve-icon Redhat

No data.