Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 23 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code. | |
| Title | Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload | |
| First Time appeared |
Redaxo
Redaxo redaxo |
|
| Weaknesses | CWE-863 | |
| CPEs | cpe:2.3:a:redaxo:redaxo:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Redaxo
Redaxo redaxo |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-23T18:30:53.506Z
Reserved: 2026-05-23T15:48:30.219Z
Link: CVE-2018-25353
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-23T19:30:25Z
Weaknesses