CVE-2023-53981
PhotoShow 3.0 Remote Code Execution via Exiftran Path Injection
CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th
PhotoShow 3.0 contains a remote code execution vulnerability that allows authenticated administrators to inject malicious commands through the exiftran path configuration. Attackers can exploit the ffmpeg configuration settings by base64 encoding a reverse shell command and executing it through a crafted video upload process.
| CWE | CWE-78 |
| Vendor | thibaud-rohmer |
| Product | photoshow |
| Published | Dec 22, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for thibaud-rohmer photoshow
Be the first to know when new high vulnerabilities affecting thibaud-rohmer photoshow are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
thibaud-rohmer / PhotoShow
3.0
References
exploit-db.com: https://www.exploit-db.com/exploits/51236 lscp.llc: https://lscp.llc/index.php/2021/07/19/how-white-box-hacking-works-remote-code-execution-and-stored-xss-in-photoshow-3-0/ github.com: https://github.com/thibaud-rohmer/PhotoShow vulncheck.com: https://www.vulncheck.com/advisories/photoshow-remote-code-execution-via-exiftran-path-injection
Credits
LSCP Responsible Disclosure Lab