Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
References
Configurations
No configuration.
History
19 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
References | () https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 - | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
Summary |
|
12 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 16:15
Updated : 2025-03-19 19:15
NVD link : CVE-2025-26260
Mitre link : CVE-2025-26260
CVE.ORG link : CVE-2025-26260
JSON object : View
Products Affected
No product.
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')