CVE-2023-53971
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-22

Last updated on: 2025-12-26

Assigner: VulnCheck

Description
WebTareas 2.4 contains a file upload vulnerability that allows authenticated users to upload malicious PHP files through the chat photo upload functionality. Attackers can upload a PHP file with arbitrary code to the /files/Messages/ directory and execute it directly through the generated file path.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-22
Last Modified
2025-12-26
Generated
2026-05-07
AI Q&A
2025-12-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
webtareas_project webtareas 2.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2023-53971 is a high-severity vulnerability in WebTareas version 2.4 that allows authenticated users to upload malicious PHP files through the chat photo upload feature. These files are saved in the /files/Messages/ directory and can be executed directly by accessing their URL, enabling attackers to run arbitrary PHP code on the server. This occurs because the application does not properly validate uploaded files, allowing PHP files disguised as images to be uploaded and executed. [1, 2]


How can this vulnerability impact me? :

This vulnerability can lead to remote code execution on the affected server, allowing attackers to execute arbitrary PHP code with the privileges of the web server. This can compromise the confidentiality, integrity, and availability of the system, potentially leading to data theft, data manipulation, service disruption, or full system compromise. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious file uploads to the /files/Messages/ directory, especially PHP files uploaded via the chat photo upload functionality. One can look for HTTP POST requests to the endpoint /webtareas/includes/chattab_serv.php with multipart/form-data containing PHP files disguised as images. For detection, you can use network monitoring tools or web server logs to identify such uploads. Example commands include using curl to simulate or detect uploads, or grep to search server logs for PHP files in the /files/Messages/ directory. For instance, to check for PHP files in the upload directory: `find /path/to/webtareas/files/Messages/ -name '*.php'` or to search web server logs for suspicious POST requests: `grep 'chattab_serv.php' /var/log/apache2/access.log | grep 'POST'`. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting or disabling the chat photo upload functionality for authenticated users until a patch is applied, implementing strict server-side validation to prevent uploading of executable PHP files, and restricting execution permissions in the /files/Messages/ directory to prevent execution of uploaded files. Additionally, monitoring and removing any suspicious PHP files found in the upload directory is critical. Applying any available security patches or updates from the vendor is also recommended. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart