2026-05-23 18:30CVE-2018-25353VulnCheck
PUBLISHED5.2CWE-863

Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload

Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code.

Problem type

Affected products

Redaxo

Redaxo CMS Mediapool

<= 5.5.1 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2018-25353
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2018-25353",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2026-05-23T18:30:53.506Z",
    "dateReserved": "2026-05-23T15:48:30.219Z",
    "datePublished": "2026-05-23T18:30:53.506Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2026-05-23T18:30:53.506Z"
      },
      "datePublic": "2018-06-13T00:00:00.000Z",
      "title": "Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload",
      "descriptions": [
        {
          "lang": "en",
          "value": "Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code."
        }
      ],
      "affected": [
        {
          "vendor": "Redaxo",
          "product": "Redaxo CMS Mediapool",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "5.5.1"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Incorrect Authorization",
              "cweId": "CWE-863",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.exploit-db.com/exploits/44891",
          "name": "ExploitDB-44891",
          "tags": [
            "exploit"
          ]
        },
        {
          "url": "https://redaxo.org",
          "name": "Official Product Homepage",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://redaxo.org/download/redaxo/5.5.1.zip",
          "name": "Product Reference",
          "tags": [
            "product"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/redaxo-cms-mediapool-addon-arbitrary-file-upload",
          "name": "VulnCheck Advisory: Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS"
        },
        {
          "format": "CVSS",
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "attackVector": "NETWORK",
            "attackComplexity": "LOW",
            "privilegesRequired": "LOW",
            "userInteraction": "NONE",
            "scope": "UNCHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH"
          }
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "mn@HackerWerkstatt",
          "type": "finder"
        }
      ]
    }
  }
}