CVE-2023-2648
Weaver E-Office uploadify.php unrestricted upload
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- May 11, 2023
- Published Date
- May 11, 2023
- Last Updated
- January 24, 2025
- Vendor
- Weaver
- Product
- E-Office
- Description
- A vulnerability was found in Weaver E-Office 9.5. It has been classified as critical. This affects an unknown part of the file /inc/jquery/uploadify/uploadify.php. The manipulation of the argument Filedata leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Es wurde eine Schwachstelle in Weaver E-Office 9.5 ausgemacht. Sie wurde als kritisch eingestuft. Es geht dabei um eine nicht klar definierte Funktion der Datei /inc/jquery/uploadify/uploadify.php. Durch Beeinflussen des Arguments Filedata mit unbekannten Daten kann eine unrestricted upload-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung.
- Tags
- Score
- 92.33% (Percentile: 99.71%) as of 2025-06-14
- Exploitation
- poc
- Technical Impact
- partial
- Exploited in the Wild
- Yes (2025-05-28 00:00:00 UTC) Source
php
nuclei_scanner
CVSS Scores
CVSS v3.1
6.3 - MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS v3.0
6.3 - MEDIUM
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS v2.0
6.5
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P
EPSS Score
SSVC Information
Exploit Status
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
The Shadowserver (via CIRCL) | 2025-05-29 12:00:30 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-2648.yaml | 2025-04-26 00:00:00 UTC |
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nuclei
-
Added to KEVIntel