CVE-2026-3749

A weakness has been identified in Bytedesk up to 1.3.9. This vulnerability affects the function handleFileUpload of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestService.java of the component SVG File Handler. Executing a manipulation can lead to unrestricted upload. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 1.4.5.1 is able to resolve this issue. This patch is called 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*

History

10 Mar 2026, 18:52

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en Bytedesk hasta la versión 1.3.9. Esta vulnerabilidad afecta a la función handleFileUpload del archivo source-code/src/main/java/com/bytedesk/core/upload/UploadRestService.java del componente Gestor de Archivos SVG. La ejecución de una manipulación puede llevar a una subida sin restricciones. El ataque puede ejecutarse de forma remota. El exploit ha sido puesto a disposición del público y podría ser utilizado para ataques. Actualizar a la versión 1.4.5.1 es capaz de resolver este problema. Este parche se denomina 975e39e4dd527596987559f56c5f9f973f64eff7. Se recomienda actualizar el componente afectado.
CPE cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*
First Time Bytedesk
Bytedesk bytedesk
References () https://github.com/Bytedesk/bytedesk/ - () https://github.com/Bytedesk/bytedesk/ - Product
References () https://github.com/Bytedesk/bytedesk/commit/975e39e4dd527596987559f56c5f9f973f64eff7 - () https://github.com/Bytedesk/bytedesk/commit/975e39e4dd527596987559f56c5f9f973f64eff7 - Patch
References () https://github.com/Bytedesk/bytedesk/issues/19 - () https://github.com/Bytedesk/bytedesk/issues/19 - Exploit, Vendor Advisory
References () https://github.com/Bytedesk/bytedesk/issues/19#issue-3993480676 - () https://github.com/Bytedesk/bytedesk/issues/19#issue-3993480676 - Exploit, Vendor Advisory
References () https://github.com/Bytedesk/bytedesk/issues/19#issuecomment-3976672845 - () https://github.com/Bytedesk/bytedesk/issues/19#issuecomment-3976672845 - Exploit, Vendor Advisory
References () https://github.com/Bytedesk/bytedesk/releases/tag/v1.4.5.1 - () https://github.com/Bytedesk/bytedesk/releases/tag/v1.4.5.1 - Release Notes
References () https://vuldb.com/?ctiid.349727 - () https://vuldb.com/?ctiid.349727 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.349727 - () https://vuldb.com/?id.349727 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.768030 - () https://vuldb.com/?submit.768030 - Third Party Advisory, VDB Entry

08 Mar 2026, 16:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-08 16:16

Updated : 2026-03-10 18:52


NVD link : CVE-2026-3749

Mitre link : CVE-2026-3749

CVE.ORG link : CVE-2026-3749


JSON object : View

Products Affected

bytedesk

  • bytedesk
CWE
CWE-284

Improper Access Control

CWE-434

Unrestricted Upload of File with Dangerous Type