CVE-2023-53902
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-24

Assigner: VulnCheck

Description
WebsiteBaker 2.13.3 contains a directory traversal vulnerability that allows authenticated attackers to delete arbitrary files by manipulating directory path parameters. Attackers can send crafted GET requests to /admin/media/delete.php with directory traversal sequences to delete files outside the intended directory.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-24
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
websitebaker websitebaker 2.13.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a directory traversal flaw in WebsiteBaker version 2.13.3 that allows authenticated attackers to delete arbitrary files or directories on the server. By manipulating the directory path parameter in a specially crafted GET request to /admin/media/delete.php, attackers can traverse outside the intended directory and delete files beyond their authorized scope. [2]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized deletion of files or directories on the server hosting WebsiteBaker. This can cause data loss, disruption of service, and potential denial of service conditions, impacting the availability and integrity of the affected system. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP GET requests to the endpoint /admin/media/delete.php that include directory traversal sequences in the 'dir' parameter. For example, look for requests containing patterns like '/../' or similar path traversal payloads. A sample detection command using grep on web server logs could be: grep -E '/admin/media/delete.php.*dir=.*\.\./' /var/log/apache2/access.log. Additionally, inspecting for suspicious deletion activity or unexpected file removals in the media directories may help identify exploitation attempts. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting access to the /admin/media/delete.php endpoint to trusted and authenticated users only, as the vulnerability requires authentication. Additionally, apply input validation and sanitization on the 'dir' parameter to prevent directory traversal sequences. If possible, update WebsiteBaker to a version where this vulnerability is fixed or apply available patches. As a temporary measure, monitor and block suspicious requests containing directory traversal patterns targeting this endpoint. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart