CVE-2023-33177

HIGH

Xibo CMS <2.3.17-3.3.5 - Path Traversal

Title source: llm

Description

Xibo is a content management system (CMS). A path traversal vulnerability exists in the Xibo CMS whereby a specially crafted zip file can be uploaded to the CMS via the layout import function by an authenticated user which would allow creation of files outside of the CMS library directory as the webserver user. This can be used to upload a PHP webshell inside the web root directory and achieve remote code execution as the webserver user. Users should upgrade to version 2.3.17 or 3.3.5, which fix this issue. Customers who host their CMS with Xibo Signage have already received an upgrade or patch to resolve this issue regardless of the CMS version that they are running.

Exploits (3)

exploitdb WORKING POC
by complexusprada · pythonwebappsmultiple
https://www.exploit-db.com/exploits/52500
nomisec WORKING POC
by kaxm23 · poc
https://github.com/kaxm23/-CVE-2023-33177-
nomisec WORKING POC
by complexusprada · poc
https://github.com/complexusprada/Xibo-CMS-Zip-Slip-RCE-Exploit-CVE-2023-33177

Scores

CVSS v3 8.8
EPSS 0.3433
EPSS Percentile 97.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22
Status published
Products (1)
xibosignage/xibo 1.8.0 - 2.3.17
Published May 30, 2023
Tracked Since Feb 18, 2026