Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code.
PUBLISHED5.2CWE-863
Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload
Problem type
Affected products
Redaxo
Redaxo CMS Mediapool
<= 5.5.1 - AFFECTED
References
ExploitDB-44891
https://www.exploit-db.com/exploits/44891
Official Product Homepage
https://redaxo.org
Product Reference
https://redaxo.org/download/redaxo/5.5.1.zip
VulnCheck Advisory: Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload
https://www.vulncheck.com/advisories/redaxo-cms-mediapool-addon-arbitrary-file-upload
JSON source
https://cveawg.mitre.org/api/cve/CVE-2018-25353Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2018-25353",
"assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"assignerShortName": "VulnCheck",
"dateUpdated": "2026-05-23T18:30:53.506Z",
"dateReserved": "2026-05-23T15:48:30.219Z",
"datePublished": "2026-05-23T18:30:53.506Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
"shortName": "VulnCheck",
"dateUpdated": "2026-05-23T18:30:53.506Z"
},
"datePublic": "2018-06-13T00:00:00.000Z",
"title": "Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload",
"descriptions": [
{
"lang": "en",
"value": "Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code."
}
],
"affected": [
{
"vendor": "Redaxo",
"product": "Redaxo CMS Mediapool",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "5.5.1"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Incorrect Authorization",
"cweId": "CWE-863",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.exploit-db.com/exploits/44891",
"name": "ExploitDB-44891",
"tags": [
"exploit"
]
},
{
"url": "https://redaxo.org",
"name": "Official Product Homepage",
"tags": [
"product"
]
},
{
"url": "https://redaxo.org/download/redaxo/5.5.1.zip",
"name": "Product Reference",
"tags": [
"product"
]
},
{
"url": "https://www.vulncheck.com/advisories/redaxo-cms-mediapool-addon-arbitrary-file-upload",
"name": "VulnCheck Advisory: Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{
"format": "CVSS"
},
{
"format": "CVSS",
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "mn@HackerWerkstatt",
"type": "finder"
}
]
}
}
}