Cyber Posture

CVE-2023-53922

CriticalPublic PoC

Published: 17 December 2025

Published
17 December 2025
Modified
24 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0231 84.9th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

TinyWebGallery v2.5 contains a remote code execution vulnerability in the admin upload functionality that allows unauthenticated attackers to upload malicious PHP files. Attackers can upload .phar files with embedded system commands to execute arbitrary code on the server by accessing…

more

the uploaded file's URL.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediates the unrestricted file upload flaw in TinyWebGallery's admin functionality, preventing exploitation of CVE-2023-53922 by applying patches or mitigations.

prevent

Validates uploaded files at the admin upload point to reject dangerous types like .phar and malicious PHP content, directly blocking the RCE vector.

prevent

Enforces approved authorizations requiring authentication for the admin upload functionality, stopping unauthenticated attackers from uploading malicious files.

Security SummaryAI

TinyWebGallery version 2.5 suffers from a remote code execution vulnerability in its admin upload functionality, classified as CVE-2023-53922 with CWE-434 (Unrestricted Upload of File with Dangerous Type). This flaw enables unauthenticated attackers to upload malicious PHP files, specifically .phar files containing embedded system commands. By subsequently accessing the URL of the uploaded file, attackers can trigger execution of arbitrary code on the server. The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and lack of required privileges.

Unauthenticated remote attackers can exploit this vulnerability directly over the network without user interaction. The attack involves leveraging the unrestricted admin upload feature to place a malicious .phar file on the server, followed by a simple HTTP request to its URL, resulting in immediate code execution with the privileges of the web server process. Successful exploitation grants attackers high confidentiality, integrity, and availability impacts, potentially leading to full server compromise, data theft, or further lateral movement.

Advisories and references, including those from VulnCheck (https://www.vulncheck.com/advisories/tinywebgallery-remote-code-execution-via-unrestricted-file-upload) and Exploit-DB (https://www.exploit-db.com/exploits/51443), detail the vulnerability and provide proof-of-concept exploits. The official TinyWebGallery site (http://www.tinywebgallery.com/) is also referenced, though no specific patches or mitigations for version 2.5 are detailed in the available information. Security practitioners should review these resources for remediation guidance, such as upgrading to a patched version if available or implementing file upload restrictions.

A public proof-of-concept exploit is available on Exploit-DB, highlighting the risk of real-world exploitation against exposed TinyWebGallery v2.5 instances.

Details

CWE(s)

Affected Products

tinywebgallery
tinywebgallery
2.5

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

The vulnerability enables unauthenticated RCE via unrestricted file upload in a public-facing web application (T1190), allowing upload and execution of malicious PHP/.phar files functioning as web shells (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References