Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mg7h-mgjw-mg5g

Опубликовано: 05 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE).

This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE).

This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.

EPSS

Процентиль: 50%
0.0027
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-434

Связанные уязвимости

CVSS3: 6.7
nvd
3 месяца назад

An arbitrary file upload vulnerability exists in multiple WSO2 products due to improper input validation in the CarbonAppUploader admin service endpoint. An authenticated attacker with appropriate privileges can upload a malicious file to a user-controlled location on the server, potentially leading to remote code execution (RCE). This functionality is restricted by default to admin users; therefore, successful exploitation requires valid credentials with administrative permissions.

EPSS

Процентиль: 50%
0.0027
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-434