CVE-2024-58281
Severity CVSS v4.0:
HIGH
Type:
CWE-434
Unrestricted Upload of File with Dangerous Type
Publication date:
10/12/2025
Last modified:
19/12/2025
Description
Dotclear 2.29 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload process by crafting a PHP shell with a command execution form to gain system access through the uploaded file.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:dotclear:dotclear:2.29:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.dotclear.org/explore/repos
- https://github.com/dotclear/dotclear/archive/refs/heads/master.zip
- https://www.exploit-db.com/exploits/52037
- https://www.vulncheck.com/advisories/dotclear-remote-code-execution-via-authenticated-file-upload
- https://github.com/dotclear/dotclear/archive/refs/heads/master.zip



