DedeCMS - Path Traversal (CVE-2023-2059)
69Exploiting IPs reported
A vulnerability was found in DedeCMS 5.7.87. It has been rated as problematic. Affected by this issue is some unknown functionality of the file uploads/include/dialog/select_templets.php. The manipulation leads to path traversal: '..\filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225944.
CrowdSec analysis
CVE-2023-2059, a path traversal vulnerability in DedeCMS version 5.7.87 allows remote attackers to manipulate file paths via the uploads/include/dialog/select_templets.php script. By exploiting this flaw, attackers could potentially access or overwrite sensitive files outside the intended directory, leading to information disclosure or system compromise. The exploit is publicly available, increasing the risk of real-world attacks.
CrowdSec has been tracking this vulnerability and its exploits since 12th of June 2025.
Insights from the CrowdSec network reveal that the attackers trying to exploit CVE-2023-2059 are composed of a fairly even mix of opportunistic and targeted actors. Some attackers employ preliminary reconnaissance, while others use indiscriminate scanning. CrowdSec data also reveals a clear uptick in attacks involving CVE-2023-2059 over the past week. Activity is above the usual baseline, suggesting growing attention from attackers. This may reflect rising awareness, recent exploit releases, or expanded targeting efforts.
Attackers exploit the templetactivepath
parameter in /include/dialog/select_templets.php
to perform directory traversal and access sensitive files on DedeCMS 5.7.87 systems.
Exploitation
Get real-time information about exploitation attempts and actors involved.
Protection
Find out relevant information to protect your stack against this CVE.
Blocklist
With our advanced worldwide network detection, CrowdSec can provide a list of IPs known for exploiting the vulnerability.
To increase your protection against this CVE, block exploitation attempts with this list of identified actors.