WEBIGniter 28.7.23 contains a file upload vulnerability that allows authenticated attackers to upload and execute dangerous PHP files through the media function. Attackers can leverage any created account to upload malicious PHP scripts that enable remote code execution on the application server.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 17 Dec 2025 02:15:00 +0900

Type Values Removed Values Added
First Time appeared Webigniter
Webigniter webigniter
Vendors & Products Webigniter
Webigniter webigniter

Tue, 16 Dec 2025 07:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 05:45:00 +0900

Type Values Removed Values Added
Description WEBIGniter 28.7.23 contains a file upload vulnerability that allows authenticated attackers to upload and execute dangerous PHP files through the media function. Attackers can leverage any created account to upload malicious PHP scripts that enable remote code execution on the application server.
Title WEBIGniter 28.7.23 Unrestricted File Upload Remote Code Execution
Weaknesses CWE-434
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-15T21:48:29.132Z

Reserved: 2025-12-13T14:25:04.998Z

Link: CVE-2023-53869

cve-icon Vulnrichment

Updated: 2025-12-15T21:41:42.781Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-15T21:15:49.263

Modified: 2025-12-16T14:10:11.300

Link: CVE-2023-53869

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-17T02:11:16Z

Weaknesses