{"api_version":"1","generated_at":"2026-04-26T11:44:00+00:00","cve":"CVE-2023-0935","urls":{"html":"https://cve.report/CVE-2023-0935","api":"https://cve.report/api/cve/CVE-2023-0935.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-0935","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-0935"},"summary":{"title":"CVE-2023-0935","description":"A vulnerability was found in DolphinPHP up to 1.5.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file common.php of the component Incomplete Fix CVE-2021-46097. The manipulation of the argument id leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221551.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-02-21 10:15:00","updated_at":"2023-11-07 04:01:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.221551","name":"https://vuldb.com/?ctiid.221551","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://github.com/ssteveez/dolphin/blob/main/README.md","name":"https://github.com/ssteveez/dolphin/blob/main/README.md","refsource":"MISC","tags":[],"title":"dolphin/README.md at main · ssteveez/dolphin · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?id.221551","name":"https://vuldb.com/?id.221551","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-0935","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-0935","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"935","vulnerable":"1","versionEndIncluding":"1.5.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"dolphinphp_project","cpe5":"dolphinphp","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-0935","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability was found in DolphinPHP up to 1.5.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file common.php of the component Incomplete Fix CVE-2021-46097. The manipulation of the argument id leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221551."},{"lang":"deu","value":"In DolphinPHP bis 1.5.1 wurde eine kritische Schwachstelle ausgemacht. Das betrifft eine unbekannte Funktionalität der Datei common.php der Komponente Incomplete Fix CVE-2021-46097. Dank der Manipulation des Arguments id mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78 OS Command Injection","cweId":"CWE-78"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"DolphinPHP","version":{"version_data":[{"version_affected":"=","version_value":"1.5.0"},{"version_affected":"=","version_value":"1.5.1"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.221551","refsource":"MISC","name":"https://vuldb.com/?id.221551"},{"url":"https://vuldb.com/?ctiid.221551","refsource":"MISC","name":"https://vuldb.com/?ctiid.221551"},{"url":"https://github.com/ssteveez/dolphin/blob/main/README.md","refsource":"MISC","name":"https://github.com/ssteveez/dolphin/blob/main/README.md"}]},"credits":[{"lang":"en","value":"bydsteve (VulDB User)"}],"impact":{"cvss":[{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"},{"version":"2.0","baseScore":6.5,"vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}]}},"nvd":{"publishedDate":"2023-02-21 10:15:00","lastModifiedDate":"2023-11-07 04:01:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:dolphinphp_project:dolphinphp:*:*:*:*:*:*:*:*","versionEndIncluding":"1.5.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}