๐Ÿ” CVE Alert

CVE-2023-53981

HIGH 7.2

PhotoShow 3.0 Remote Code Execution via Exiftran Path Injection

CVSS Score
7.2
EPSS Score
0.0%
EPSS Percentile
0th

PhotoShow 3.0 contains a remote code execution vulnerability that allows authenticated administrators to inject malicious commands through the exiftran path configuration. Attackers can exploit the ffmpeg configuration settings by base64 encoding a reverse shell command and executing it through a crafted video upload process.

CWE CWE-78
Vendor thibaud-rohmer
Product photoshow
Published Dec 22, 2025
Last Updated Apr 7, 2026
Stay Ahead of the Next One

Get instant alerts for thibaud-rohmer photoshow

Be the first to know when new high vulnerabilities affecting thibaud-rohmer photoshow are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

thibaud-rohmer / PhotoShow
3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/51236 lscp.llc: https://lscp.llc/index.php/2021/07/19/how-white-box-hacking-works-remote-code-execution-and-stored-xss-in-photoshow-3-0/ github.com: https://github.com/thibaud-rohmer/PhotoShow vulncheck.com: https://www.vulncheck.com/advisories/photoshow-remote-code-execution-via-exiftran-path-injection

Credits

LSCP Responsible Disclosure Lab