{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2023-53871","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2025-12-13T14:25:04.998Z","datePublished":"2025-12-15T20:28:14.547Z","dateUpdated":"2026-04-07T14:06:57.927Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-04-07T14:06:57.927Z"},"title":"Soosyze 2.0.0 Unrestricted File Upload via Broken Upload Logic","descriptions":[{"lang":"en","value":"Soosyze 2.0.0 contains a file upload vulnerability that allows attackers to upload arbitrary HTML files with embedded PHP code to the application. Attackers can exploit the broken file upload mechanism to potentially view sensitive file paths and execute malicious PHP scripts on the server."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Unrestricted Upload of File with Dangerous Type","cweId":"CWE-434","type":"CWE"}]}],"affected":[{"vendor":"Soosyze","product":"Soosyze","versions":[{"version":"2.0.0","status":"affected"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:soosyze:soosyze:1.0.0:-:*:*:*:*:*:*"}]}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":6.9,"baseSeverity":"MEDIUM","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"}],"references":[{"url":"https://www.exploit-db.com/exploits/51718","name":"ExploitDB-51718","tags":["exploit"]},{"url":"https://soosyze.com/","name":"soosyze Product Homepage","tags":["product"]},{"url":"https://github.com/soosyze/soosyze","name":"soosyze GitHub Repository","tags":["product"]},{"name":"VulnCheck Advisory: Soosyze 2.0.0 Unrestricted File Upload via Broken Upload Logic","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/soosyze-unrestricted-file-upload-via-broken-upload-logic"}],"credits":[{"lang":"en","value":"nu11secur1ty","type":"finder"}],"x_generator":{"engine":"vulncheck"},"datePublic":"2023-09-08T00:00:00.000Z"},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-15T21:41:21.158768Z","id":"CVE-2023-53871","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-15T21:48:18.282Z"}}]}}