VYPR
Unrated severityNVD Advisory· Published May 23, 2026

Redaxo CMS Mediapool Addon 5.5.1 Arbitrary File Upload

CVE-2018-25353

Description

Redaxo CMS Mediapool Addon 5.5.1 and older contains an arbitrary file upload vulnerability that allows authenticated users to bypass file extension blacklist restrictions. Attackers with editor accounts can upload executable files by using obfuscated extensions like php71 or php53 to evade the blacklist filter and execute arbitrary code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Redaxo CMS Mediapool Addon <=5.5.1 allows authenticated users to upload arbitrary files using obfuscated extensions, leading to remote code execution.

Vulnerability

The Redaxo CMS Mediapool Addon versions 5.5.1 and older contain an arbitrary file upload vulnerability. The addon uses a blacklist filter that blocks file extensions such as php, php4, php5, php6, and php7. However, the filter does not account for obfuscated extensions like php71 or php53, allowing attackers to bypass the restriction. This affects the mediapool functionality within Redaxo CMS [2][3].

Exploitation

An attacker must have an authenticated editor account on the Redaxo CMS. The attacker can log in, navigate to the mediapool page (?page=mediapool/media), and upload a malicious file with an obfuscated extension (e.g., shell.php71). The file is accepted because the blacklist does not recognize the obfuscated extension. The attacker can then access the uploaded file to execute arbitrary code [3].

Impact

Successful exploitation allows an attacker to upload and execute arbitrary PHP code on the server. This leads to full compromise of the web application, including data theft, privilege escalation, and potential server takeover. The CVSS v4 vector indicates high impact to confidentiality, integrity, and availability [2].

Mitigation

The vulnerability is fixed in Mediapool Addon version 2.4.0 and Redaxo CMS version 5.6.0, released on 2018-06-08 [3]. Users should upgrade to the latest version. No workarounds are documented; upgrading is the only mitigation.

AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.