Vulnerabilities (CVE)

Filtered by CWE-434
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-9642 1 Pydio 1 Pydio 2021-07-21 7.5 HIGH 9.8 CRITICAL
An issue was discovered in proxy.php in pydio-core in Pydio through 8.2.2. Through an unauthenticated request, it possible to evaluate malicious PHP code by placing it on the fourth line of a .php file, as demonstrated by a PoC.php created by the guest account, with execution via a proxy.php?hash=../../../../../var/lib/pydio/data/personal/guest/PoC.php request. This is related to plugins/action.share/src/Store/ShareStore.php.
CVE-2018-12426 1 3cx 1 Live Chat 2021-07-20 7.5 HIGH 9.8 CRITICAL
The WP Live Chat Support Pro plugin before 8.0.07 for WordPress is vulnerable to unauthenticated Remote Code Execution due to client-side validation of allowed file types, as demonstrated by a v1/remote_upload request with a .php filename and the image/jpeg content type.
CVE-2021-32538 1 Artware Cms Project 1 Artware Cms 2021-07-10 7.5 HIGH 9.8 CRITICAL
ARTWARE CMS parameter of image upload function does not filter the type of upload files which allows remote attackers can upload arbitrary files without logging in, and further execute code unrestrictedly.
CVE-2020-22249 1 Phplist 1 Phplist 2021-07-08 7.5 HIGH 9.8 CRITICAL
Remote Code Execution vulnerability in phplist 3.5.1. The application does not check any file extensions stored in the plugin zip file, Uploading a malicious plugin which contains the php files with extensions like PHP,phtml,php7 will be copied to the plugins directory which would lead to the remote code execution
CVE-2021-34074 1 Pandorafms 1 Pandora Fms 2021-07-01 7.5 HIGH 9.8 CRITICAL
PandoraFMS <=7.54 allows arbitrary file upload, it leading to remote command execution via the File Manager. To bypass the built-in protection, a relative path is used in the requests.
CVE-2020-21786 1 Ibos 1 Ibos 2021-07-01 7.5 HIGH 9.8 CRITICAL
In IBOS 4.5.4 Open, Arbitrary File Inclusion causes getshell via /system/modules/dashboard/controllers/CronController.php.
CVE-2020-21787 1 Crmeb 1 Crmeb 2021-06-30 10.0 HIGH 9.8 CRITICAL
CRMEB 3.1.0+ is vulnerable to File Upload Getshell via /crmeb/crmeb/services/UploadService.php.
CVE-2010-1433 1 Joomla 1 Joomla\! 2021-06-25 7.5 HIGH 9.8 CRITICAL
Joomla! Core is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. Joomla! Core versions 1.5.x ranging from 1.5.0 and up to and including 1.5.15 are vulnerable.
CVE-2020-19510 2 Microsoft, Textpattern 2 Windows, Textpattern 2021-06-24 7.5 HIGH 9.8 CRITICAL
Textpattern 4.7.3 contains an aribtrary file load via the file_insert function in include/txp_file.php.
CVE-2020-28871 1 Monitorr Project 1 Monitorr 2021-06-23 7.5 HIGH 9.8 CRITICAL
Remote code execution in Monitorr v1.7.6m in upload.php allows an unauthorized person to execute arbitrary code on the server-side via an insecure file upload.
CVE-2013-20002 1 Themify 1 Framework 2021-06-23 7.5 HIGH 9.8 CRITICAL
Elemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.
CVE-2020-7864 1 Dext5 1 Dext5 Editor 2021-06-22 7.5 HIGH 9.8 CRITICAL
Parameter manipulation can bypass authentication to cause file upload and execution. This will execute the remote code. This issue affects: Raonwiz DEXT5Editor versions prior to 3.5.1405747.1100.03.
CVE-2021-23394 1 Std42 1 Elfinder 2021-06-22 6.8 MEDIUM 9.8 CRITICAL
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2020-35760 1 Bloofox 1 Bloofoxcms 2021-06-17 7.5 HIGH 9.8 CRITICAL
bloofoxCMS 0.5.2.1 is infected with Unrestricted File Upload that allows attackers to upload malicious files (ex: php files).
CVE-2020-35442 1 Fangfa 1 Fdcms 2021-06-11 7.5 HIGH 9.8 CRITICAL
FDCMS (also known as Fangfa Content Management System) 4.0 allows remote attackers to get a webshell in the background via Front/lib/Action/FindexAction.class.php.
CVE-2021-31703 1 Frontiersoftware 1 Ichris 2021-06-10 7.5 HIGH 9.8 CRITICAL
Frontier ichris through 5.18 allows users to upload malicious executable files that might later be downloaded and run by any client user.
CVE-2021-27459 1 Emerson 8 X-stream Enhanced Xefd, X-stream Enhanced Xefd Firmware, X-stream Enhanced Xegk and 5 more 2021-05-28 7.5 HIGH 9.8 CRITICAL
A vulnerability has been found in multiple revisions of Emerson Rosemount X-STREAM Gas Analyzer. The webserver of the affected products allows unvalidated files to be uploaded, which an attacker could utilize to execute arbitrary code.
CVE-2021-32089 1 Zebra 2 Fx9500, Fx9500 Firmware 2021-05-25 7.5 HIGH 9.8 CRITICAL
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on Zebra (formerly Motorola Solutions) Fixed RFID Reader FX9500 devices. An unauthenticated attacker can upload arbitrary files to the filesystem that can then be accessed through the web interface. This can lead to information disclosure and code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
CVE-2021-20721 1 Kujirahand 1 Konawiki 2021-05-25 7.5 HIGH 9.8 CRITICAL
KonaWiki2 versions prior to 2.2.4 allows a remote attacker to upload arbitrary files via unspecified vectors. If the file contains PHP scripts, arbitrary code may be executed.
CVE-2020-18166 1 Laobancms 1 Laobancms 2021-05-21 7.5 HIGH 9.8 CRITICAL
Unrestricted File Upload in LAOBANCMS v2.0 allows remote attackers to upload arbitrary files by attaching a file with a ".jpg.php" extension to the component "admin/wenjian.php?wj=../templets/pc".
CVE-2020-28063 1 Articlecms Project 1 Articlecms 2021-05-20 7.5 HIGH 9.8 CRITICAL
A file upload issue exists in all versions of ArticleCMS which allows malicious users to getshell.
CVE-2020-20092 1 Articlecms Project 1 Articlecms 2021-05-20 7.5 HIGH 9.8 CRITICAL
File Upload vulnerability exists in ArticleCMS 1.0 via the image upload feature at /admin by changing the Content-Type to image/jpeg and placing PHP code after the JPEG data, which could let a remote malicious user execute arbitrary PHP code.
CVE-2021-31737 1 Emlog 1 Emlog 2021-05-12 7.5 HIGH 9.8 CRITICAL
emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php.
CVE-2021-24236 1 Imagements Project 1 Imagements 2021-05-11 7.5 HIGH 9.8 CRITICAL
The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE.
CVE-2020-23083 1 Guojusoft 1 Jeecg 2021-05-11 7.5 HIGH 9.8 CRITICAL
Unrestricted File Upload in JEECG v4.0 and earlier allows remote attackers to execute arbitrary code or gain privileges by uploading a crafted file to the component "jeecgFormDemoController.do?commonUpload".
CVE-2020-19113 1 Projectworlds 1 Online Book Store Project In Php 2021-05-10 7.5 HIGH 9.8 CRITICAL
Arbitrary File Upload vulnerability in Online Book Store v1.0 in admin_add.php, which may lead to remote code execution.
CVE-2020-21452 1 Uniview 2 Isc2500-s, Isc2500-s Firmware 2021-05-10 7.5 HIGH 9.8 CRITICAL
An issue was discovered in uniview ISC2500-S. This is an upload vulnerability where an attacker can upload malicious code via /Interface/DevManage/EC.php?cmd=upload
CVE-2018-18475 1 Zohocorp 1 Manageengine Opmanager 2021-05-04 7.5 HIGH 9.8 CRITICAL
Zoho ManageEngine OpManager before 12.3 build 123214 allows Unrestricted Arbitrary File Upload.
CVE-2021-24240 1 Aivahthemes 1 Business Hours Pro 2021-04-29 7.5 HIGH 9.8 CRITICAL
The Business Hours Pro WordPress plugin through 5.5.0 allows a remote attacker to upload arbitrary files using its manual update functionality, leading to an unauthenticated remote code execution vulnerability.
CVE-2021-24220 1 Thrivethemes 10 Focusblog, Ignition, Luxe and 7 more 2021-04-22 6.4 MEDIUM 9.1 CRITICAL
Thrive “Legacy” Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken image optimization engine. By supplying a crafted request in combination with data inserted using the Option Update vulnerability, it was possible to use this endpoint to retrieve malicious code from a remote URL and overwrite an existing file on the site with it or create a new file.This includes executable PHP files that contain malicious code.
CVE-2020-29592 1 Orchardproject 1 Orchard 2021-04-22 7.5 HIGH 9.8 CRITICAL
An issue was discovered in Orchard before 1.10. A broken access control issue in Orchard components that use the TinyMCE HTML editor's file upload allows an attacker to upload dangerous executables that bypass the file types allowed (regardless of the file types allowed list in Media settings).
CVE-2021-23280 1 Eaton 3 Intelligent Power Manager, Intelligent Power Manager Virtual Appliance, Intelligent Power Protector 2021-04-21 6.5 MEDIUM 9.9 CRITICAL
Eaton Intelligent Power Manager (IPM) prior to 1.69 is vulnerable to authenticated arbitrary file upload vulnerability. IPM’s maps_srv.js allows an attacker to upload a malicious NodeJS file using uploadBackgroud action. An attacker can upload a malicious code or execute any command using a specially crafted packet to exploit the vulnerability.
CVE-2021-24223 1 N5 Upload Form Project 1 N5 Upload Form 2021-04-20 7.5 HIGH 9.8 CRITICAL
The N5 Upload Form WordPress plugin through 1.0 suffers from an arbitrary file upload issue in page where a Form from the plugin is embed, as any file can be uploaded. The uploaded filename might be hard to guess as it's generated with md5(uniqid(rand())), however, in the case of misconfigured servers with Directory listing enabled, accessing it is trivial.
CVE-2021-24222 1 Williamluis 1 Wp-curriculo Vitae Free 2021-04-20 7.5 HIGH 9.8 CRITICAL
The WP-Curriculo Vitae Free WordPress plugin through 6.3 suffers from an arbitrary file upload issue in page where the [formCadastro] is embed. The form allows unauthenticated user to register and submit files for their profile picture as well as resume, without any file extension restriction, leading to RCE.
CVE-2021-24171 1 Woocommerce 1 Upload Files 2021-04-12 7.5 HIGH 9.8 CRITICAL
The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter.
CVE-2021-24212 1 Woocommerce 1 Help Scout 2021-04-12 7.5 HIGH 9.8 CRITICAL
The WooCommerce Help Scout WordPress plugin before 2.9.1 (https://woocommerce.com/products/woocommerce-help-scout/) allows unauthenticated users to upload any files to the site which by default will end up in wp-content/uploads/hstmp.
CVE-2021-28173 1 Deltaflow Project 1 Deltaflow 2021-04-09 7.5 HIGH 9.8 CRITICAL
The file upload function of Vangene deltaFlow E-platform does not perform access controlled properly. Remote attackers can upload and execute arbitrary files without login.
CVE-2021-30149 1 Ocproducts 1 Composr 2021-04-08 7.5 HIGH 9.8 CRITICAL
Composr 10.0.36 allows upload and execution of PHP files.
CVE-2020-21585 1 Emlog 1 Emlog 2021-04-08 7.5 HIGH 9.8 CRITICAL
Vulnerability in emlog v6.0.0 allows user to upload webshells via zip plugin module.
CVE-2021-3378 1 Fortilogger 1 Fortilogger 2021-03-31 7.5 HIGH 9.8 CRITICAL
FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
CVE-2021-27274 1 Netgear 1 Prosafe Network Management System 2021-03-30 10.0 HIGH 9.8 CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NETGEAR ProSAFE Network Management System 1.6.0.26. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MFileUploadController class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-12124.
CVE-2021-28294 1 Online Ordering System Project 1 Online Ordering System 2021-03-22 7.5 HIGH 9.8 CRITICAL
Online Ordering System 1.0 is vulnerable to arbitrary file upload through /onlineordering/GPST/store/initiateorder.php, which may lead to remote code execution (RCE).
CVE-2021-27817 1 Shopxo 1 Shopxo 2021-03-18 7.5 HIGH 9.8 CRITICAL
A remote command execution vulnerability in shopxo 1.9.3 allows an attacker to upload malicious code generated by phar where the suffix is JPG, which is uploaded after modifying the phar suffix.
CVE-2021-27964 1 Sfcyazilim 1 Sonlogger 2021-03-16 7.5 HIGH 9.8 CRITICAL
SonLogger before 6.4.1 is affected by Unauthenticated Arbitrary File Upload. An attacker can send a POST request to /Config/SaveUploadedHotspotLogoFile without any authentication or session header. There is no check for the file extension or content of the uploaded file.
CVE-2021-26918 1 Probot 1 Bot 2021-03-04 7.5 HIGH 9.8 CRITICAL
** DISPUTED ** The ProBot bot through 2021-02-08 for Discord might allow attackers to interfere with the intended purpose of the "Send an image when a user joins the server" feature (or possibly have unspecified other impact) because the uploader web service allows double extensions (such as .html.jpg) with the text/html content type. NOTE: there may not be cases in which an uploader web service is customer controlled; however, the nature of the issue has substantial interaction with customer controlled configuration. NOTE: the vendor states "This is just an uploader (like any other one) which uploads files to cloud storage and accepts various file types. There is no kind of vulnerability and it won't compromise either the client side or the server side."
CVE-2021-3120 1 Yithemes 1 Yith Woocommerce Gift Cards 2021-03-03 10.0 HIGH 9.8 CRITICAL
An arbitrary file upload vulnerability in the YITH WooCommerce Gift Cards Premium plugin before 3.3.1 for WordPress allows remote attackers to achieve remote code execution on the operating system in the security context of the web server. In order to exploit this vulnerability, an attacker must be able to place a valid Gift Card product into the shopping cart. An uploaded file is placed at a predetermined path on the web server with a user-specified filename and extension. This occurs because the ywgc-upload-picture parameter can have a .php value even though the intention was to only allow uploads of Gift Card images.
CVE-2020-10569 1 Sysaid 1 On-premise 2021-02-25 10.0 HIGH 9.8 CRITICAL
** DISPUTED ** SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack. NOTE: This may be a duplicate of CVE-2020-1938.
CVE-2021-21014 1 Magento 1 Magento 2021-02-16 6.5 MEDIUM 9.1 CRITICAL
Magento versions 2.4.1 (and earlier), 2.4.0-p1 (and earlier) and 2.3.6 (and earlier) are vulnerable to a file upload restriction bypass. Successful exploitation could lead to arbitrary code execution by an authenticated attacker. Access to the admin console is required for successful exploitation.
CVE-2020-20287 1 Yccms 1 Yccms 2021-02-04 7.5 HIGH 9.8 CRITICAL
Unrestricted file upload vulnerability in the yccms 3.3 project. The xhUp function's improper judgment of the request parameters, triggers remote code execution.
CVE-2021-21245 1 Onedev Project 1 Onedev 2021-01-21 7.5 HIGH 9.8 CRITICAL
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, AttachmentUploadServlet also saves user controlled data (`request.getInputStream()`) to a user specified location (`request.getHeader("File-Name")`). This issue may lead to arbitrary file upload which can be used to upload a WebShell to OneDev server. This issue is addressed in 4.0.3 by only allowing uploaded file to be in attachments folder. The webshell issue is not possible as OneDev never executes files in attachments folder.