Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 05 Mar 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:webtareas_project:webtareas:2.4:p3:*:*:*:*:*:* |
Fri, 26 Dec 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Webtareas Project
Webtareas Project webtareas |
|
| CPEs | cpe:2.3:a:webtareas_project:webtareas:2.4:-:*:*:*:*:*:* | |
| Vendors & Products |
Webtareas Project
Webtareas Project webtareas |
Mon, 22 Dec 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | WebTareas 2.4 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the chat photo upload functionality. Attackers can upload a PHP file with arbitrary code to the /files/Messages/ directory and execute it directly through the generated file path. | |
| Title | WebTareas 2.4 Authenticated Remote Code Execution via File Upload | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:08:14.143Z
Reserved: 2025-12-20T16:31:20.898Z
Link: CVE-2023-53971
Updated: 2025-12-22T21:58:53.199Z
Status : Analyzed
Published: 2025-12-22T22:16:02.097
Modified: 2025-12-26T17:24:05.100
Link: CVE-2023-53971
No data.
OpenCVE Enrichment
No data.