CVE-2024-58281
Gravedad CVSS v4.0:
ALTA
Tipo:
CWE-434
Subida sin restricciones de ficheros de tipos peligrosos
Fecha de publicación:
10/12/2025
Última modificación:
12/12/2025
Descripción
*** Pendiente de traducción *** Dotclear 2.29 contains a remote code execution vulnerability that allows authenticated attackers to upload malicious PHP files through the media upload functionality. Attackers can exploit the file upload process by crafting a PHP shell with a command execution form to gain system access through the uploaded file.
Impacto
Puntuación base 4.0
8.70
Gravedad 4.0
ALTA
Referencias a soluciones, herramientas e información
- https://git.dotclear.org/explore/repos
- https://github.com/dotclear/dotclear/archive/refs/heads/master.zip
- https://www.exploit-db.com/exploits/52037
- https://www.vulncheck.com/advisories/dotclear-remote-code-execution-via-authenticated-file-upload
- https://github.com/dotclear/dotclear/archive/refs/heads/master.zip



