Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xqrc-jpv5-hccp

Опубликовано: 08 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 9.3

Описание

XODA version 0.4.5 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary PHP code on the server. The flaw resides in the upload functionality, which fails to properly validate or restrict uploaded file types. By crafting a multipart/form-data POST request, an attacker can upload a .php file directly into the web-accessible files/ directory and trigger its execution via a subsequent GET request.

XODA version 0.4.5 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary PHP code on the server. The flaw resides in the upload functionality, which fails to properly validate or restrict uploaded file types. By crafting a multipart/form-data POST request, an attacker can upload a .php file directly into the web-accessible files/ directory and trigger its execution via a subsequent GET request.

EPSS

Процентиль: 98%
0.66533
Средний

9.3 Critical

CVSS4

Дефекты

CWE-434

Связанные уязвимости

nvd
6 месяцев назад

XODA version 0.4.5 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary PHP code on the server. The flaw resides in the upload functionality, which fails to properly validate or restrict uploaded file types. By crafting a multipart/form-data POST request, an attacker can upload a .php file directly into the web-accessible files/ directory and trigger its execution via a subsequent GET request.

EPSS

Процентиль: 98%
0.66533
Средний

9.3 Critical

CVSS4

Дефекты

CWE-434