CVE-2023-53941
Published: 18 December 2025
Description
EasyPHP Webserver 14.1 contains an OS command injection vulnerability that allows unauthenticated attackers to execute arbitrary system commands by injecting malicious payloads through the app_service_control parameter. Attackers can send POST requests to /index.php?zone=settings with crafted app_service_control values to execute commands…
more
with administrative privileges.
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents OS command injection by requiring validation and sanitization of the app_service_control parameter in incoming POST requests.
SI-2 mandates timely remediation of the specific flaw in EasyPHP Webserver 14.1, eliminating the command injection vulnerability.
SC-7 enables boundary protection devices like WAFs to monitor and block malicious payloads targeting the vulnerable /index.php?zone=settings endpoint.
Security SummaryAI
CVE-2023-53941 is an OS command injection vulnerability (CWE-78) affecting EasyPHP Webserver 14.1. The flaw resides in the app_service_control parameter, which fails to properly sanitize user input, enabling attackers to inject and execute arbitrary system commands.
Unauthenticated remote attackers can exploit this vulnerability by sending POST requests to /index.php?zone=settings with specially crafted app_service_control payloads. Successful exploitation grants execution of commands with administrative privileges, potentially leading to full system compromise. The issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), reflecting its critical severity due to low complexity and high impact on confidentiality, integrity, and availability.
VulnCheck has published an advisory on the remote code execution vulnerability in EasyPHP Webserver, while Exploit-DB hosts a proof-of-concept exploit (ID 51430). The vendor's site at easyphp.org provides additional context on the affected software. No specific patches or mitigations are detailed in the available references.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unauthenticated OS command injection in a public-facing web server parameter directly enables T1190 (Exploit Public-Facing Application) for initial access and T1059.003 (Windows Command Shell) for remote command execution with admin privileges.