CVE-2023-53956
Published: 19 December 2025
Description
Flatnux 2021-03.25 contains an authenticated file upload vulnerability that allows administrative users to upload arbitrary PHP files through the file manager. Attackers with admin credentials can upload malicious PHP scripts to the web root directory, enabling remote code execution on…
more
the server.
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific file upload vulnerability in Flatnux file manager to eliminate the ability to upload arbitrary PHP files.
Implements input validation mechanisms at the file manager to reject dangerous file types like PHP, preventing uploads to the web root.
Enforces least privilege on administrative accounts to minimize users able to access the vulnerable file manager and upload to web root.
Security SummaryAI
CVE-2023-53956 is an authenticated file upload vulnerability in Flatnux version 2021-03.25, specifically within its file manager component. This flaw allows administrative users to upload arbitrary PHP files directly to the web root directory. Successful exploitation enables attackers to deploy malicious PHP scripts, resulting in remote code execution (RCE) on the affected server. The vulnerability is rated with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-434 (Unrestricted Upload of File with Dangerous Type).
Attackers require administrative credentials to exploit this vulnerability, which has network accessibility, low attack complexity, and no user interaction. Once authenticated as an admin, an attacker can leverage the file manager to upload a malicious PHP file to the web root, subsequently executing arbitrary code on the server. This grants high-impact confidentiality, integrity, and availability compromises, potentially allowing full server takeover.
Advisories and references, including those from Vulncheck and a proof-of-concept on Exploit-DB, detail the vulnerability and exploitation steps. The official Flatnux site is also referenced, though no specific patches or mitigation guidance is outlined in the available information. Security practitioners should restrict admin access and monitor file uploads in affected Flatnux deployments.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Authenticated file upload vulnerability in web application file manager enables exploitation of public-facing application (T1190) to upload and execute arbitrary PHP webshells (T1100) for remote code execution.