Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
History

Mon, 15 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 15 Dec 2025 20:45:00 +0000

Type Values Removed Values Added
Description Zomplog 3.9 contains a remote code execution vulnerability that allows authenticated attackers to inject and execute arbitrary PHP code through file manipulation endpoints. Attackers can upload malicious JavaScript files, rename them to PHP, and execute system commands by exploiting the saveE and rename actions in the application.
Title Zomplog 3.9 Remote Code Execution via Authenticated File Manipulation
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-12-15T20:28:22.684Z

Updated: 2025-12-15T21:46:37.310Z

Reserved: 2025-12-15T01:02:32.434Z

Link: CVE-2023-53888

cve-icon Vulnrichment

Updated: 2025-12-15T21:37:44.284Z

cve-icon NVD

Status : Received

Published: 2025-12-15T21:15:51.973

Modified: 2025-12-15T22:15:46.800

Link: CVE-2023-53888

cve-icon Redhat

No data.