CVE-2023-53894

CRITICAL
Published Dec 16, 2025 Modified Jan 21, 2026 CWE-1390

Description

phpfm 1.7.9 contains an authentication bypass vulnerability that allows attackers to log in by exploiting loose type comparison in password hash validation. Attackers can craft specific password hashes beginning with 0e or 00e to bypass authentication and upload malicious PHP files to the server.

CVSS v3.1 Score

9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weakness Type (CWE)

CWE-1390 CWE-1390

Affected Products

Vendor Product
dulldusk phpfilemanager

References

Frequently Asked Questions

What is CVE-2023-53894? +
phpfm 1.7.9 contains an authentication bypass vulnerability that allows attackers to log in by exploiting loose type comparison in password hash validation. Attackers can craft specific password hashes beginning with 0e or 00e to bypass authentication and upload malicious PHP files to the server. It has a CVSS v3.1 base score of 9.8 (CRITICAL).
How severe is CVE-2023-53894? +
CVE-2023-53894 has a CVSS v3.1 score of 9.8 out of 10, rated CRITICAL. This is a critical vulnerability that should be patched immediately.
What products are affected by CVE-2023-53894? +
CVE-2023-53894 affects products from dulldusk, specifically: phpfilemanager. Check the affected products table above for specific version ranges.
How do I check if I'm vulnerable to CVE-2023-53894? +
You can use Secably's free Website Scanner to check your website for known vulnerabilities. For infrastructure scanning, use the Port Scanner to identify exposed services that may be affected. Check the vendor advisories linked above for specific patch and version information.

Related Vulnerabilities

Don't wait for an exploit

Scan your website for vulnerabilities like CVE-2023-53894 — free, no signup required.

Start Free Scan