An issue was discovered in MediaCrush thru 1.0.1 allowing remote unauthenticated attackers to upload arbitrary files of any size to the /upload endpoint.
References
| Link | Resource |
|---|---|
| https://gist.github.com/pescada-dev/a046d36e8026bbaf1ee591c6dad0d7e6 | Exploit Third Party Advisory |
Configurations
History
11 Feb 2026, 19:26
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mediacrush:mediacrush:*:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/pescada-dev/a046d36e8026bbaf1ee591c6dad0d7e6 - Exploit, Third Party Advisory | |
| First Time |
Mediacrush mediacrush
Mediacrush |
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-434 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
03 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-03 18:16
Updated : 2026-02-11 19:26
NVD link : CVE-2025-61506
Mitre link : CVE-2025-61506
CVE.ORG link : CVE-2025-61506
JSON object : View
Products Affected
mediacrush
- mediacrush
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
