CVE-2023-2453

Source
https://cve.org/CVERecord?id=CVE-2023-2453
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2453.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-2453
Published
2023-09-05T15:15:42.377Z
Modified
2025-11-20T12:16:18.565941Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.

References

Affected packages

Git / github.com/phpfusion/phpfusion

Affected ranges

Type
GIT
Repo
https://github.com/phpfusion/phpfusion
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v9.*
v9.10.03
v9.10.30

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-2453.json"