๐Ÿ” CVE Alert

CVE-2023-53971

HIGH 8.8

WebTareas 2.4 Authenticated Remote Code Execution via File Upload

CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th

WebTareas 2.4 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the chat photo upload functionality. Attackers can upload a PHP file with arbitrary code to the /files/Messages/ directory and execute it directly through the generated file path.

CWE CWE-434
Vendor luiswang
Product webtareas
Published Dec 22, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for luiswang webtareas

Be the first to know when new high vulnerabilities affecting luiswang webtareas are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

luiswang / WebTareas
2.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/51089 sourceforge.net: https://sourceforge.net/projects/webtareas/ vulncheck.com: https://www.vulncheck.com/advisories/webtareas-authenticated-remote-code-execution-via-file-upload

Credits

Hubert Wojciechowski