CVE-2024-58281
Severity CVSS v4.0:
HIGH
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
10/12/2025
Last modified:
12/12/2025
Description
Dotclear 2.29 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload process by crafting a PHP shell with a command execution form to gain system access through the uploaded file.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://git.dotclear.org/explore/repos
- https://github.com/dotclear/dotclear/archive/refs/heads/master.zip
- https://www.exploit-db.com/exploits/52037
- https://www.vulncheck.com/advisories/dotclear-remote-code-execution-via-authenticated-file-upload
- https://github.com/dotclear/dotclear/archive/refs/heads/master.zip



