CVE-2023-53895
Unknown Unknown - Not Provided
Improper Access Control in PimpMyLog 1.7.14 Enables Admin Account Creation

Publication date: 2025-12-16

Last updated on: 2025-12-16

Assigner: VulnCheck

Description
PimpMyLog 1.7.14 contains an improper access control vulnerability that allows remote attackers to create admin accounts without authorization through the configuration endpoint. Attackers can exploit the unsanitized username field to inject malicious JavaScript, create a hidden backdoor account, and potentially access sensitive server-side log information and environmental variables.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-16
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
pimpmylog pimpmylog 1.7.14
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in PimpMyLog 1.7.14 is an improper access control flaw that allows remote attackers to create administrative accounts without authorization by exploiting the configuration endpoint. Attackers can inject malicious JavaScript into the unsanitized username field, creating a hidden backdoor admin account. This injected script hides the malicious account from legitimate administrators and can potentially allow attackers to access sensitive server-side log information and environment variables. [3]


How can this vulnerability impact me? :

The impact of this vulnerability includes unauthorized creation of admin accounts, which grants attackers full administrative access to the PimpMyLog application. This can lead to unauthorized access to sensitive server logs (such as Apache, IIS, NGINX, PHP logs) and environment variables that may contain confidential data like passwords and API keys. The hidden backdoor account can evade detection by legitimate administrators, increasing the risk of persistent unauthorized access and data exposure. [3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized POST requests to the /inc/configure.php endpoint that attempt to create new admin accounts. Specifically, look for POST requests containing parameters that create users with admin privileges and include suspicious or encoded JavaScript payloads in the username field. Network intrusion detection systems (NIDS) or web application firewalls (WAF) can be configured to alert on such patterns. Additionally, reviewing server logs for unexpected admin account creations or unusual JavaScript injections in usernames can help detect exploitation attempts. Example commands include using curl to test the endpoint or grep to search logs for suspicious entries. For instance, to check logs for suspicious usernames: `grep -i 'admin' /path/to/pimpmylog/logs/* | grep -E '<script|base64'` or to simulate the exploit attempt: `curl -X POST -d 'username=malicious_payload&other_params=values' https://yourserver/inc/configure.php`. [3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the /inc/configure.php endpoint to trusted administrators only, such as by implementing IP whitelisting or authentication controls at the web server or firewall level. Disable or restrict the account creation functionality if possible. Apply input validation and sanitization on the username field to prevent JavaScript injection. If a patch or updated version of PimpMyLog is available that addresses this vulnerability, apply it promptly. Additionally, review existing admin accounts for unauthorized additions and remove any suspicious accounts. Monitor logs for further exploitation attempts and consider temporarily disabling the PimpMyLog service until the vulnerability is mitigated. [3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthorized remote attackers to create hidden admin accounts and potentially access sensitive server-side log information and environment variables, which may include confidential data such as passwords and API keys. This unauthorized access and potential data exposure could lead to non-compliance with common standards and regulations like GDPR and HIPAA that require protection of sensitive information and proper access controls. However, specific impacts on compliance are not detailed in the provided resources. [3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart