Vulnerabilities (CVE)

Filtered by CWE-434
Total 3709 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2026-1021 1 Gotac 1 Police Statistics Database System 2026-01-23 N/A 9.8 CRITICAL
Police Statistics Database System developed by Gotac has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attacker to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
CVE-2023-25444 1 Joomsky 1 Js Help Desk 2026-01-23 N/A 9.1 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in JS Help Desk JS Help Desk – Best Help Desk & Support Plugin allows Using Malicious Files.This issue affects JS Help Desk – Best Help Desk & Support Plugin: from n/a through 2.7.7.
CVE-2022-1952 1 Syntacticsinc 1 Easync 2026-01-23 7.5 HIGH 9.8 CRITICAL
The Free Booking Plugin for Hotels, Restaurant and Car Rental WordPress plugin before 1.1.16 suffers from insufficient input validation which leads to arbitrary file upload and subsequently to remote code execution. An AJAX action accessible to unauthenticated users is affected by this issue. An allowlist of valid file extensions is defined but is not used during the validation steps.
CVE-2026-22241 1 Openeclass 1 Openeclass 2026-01-23 N/A 7.2 HIGH
The Open eClass platform (formerly known as GUnet eClass) is a complete course management system. Prior to version 4.2, an arbitrary file upload vulnerability in the theme import functionality enables an attacker with administrative privileges to upload arbitrary files on the server's file system. The main cause of the issue is that no validation or sanitization of the file's present inside the zip archive. This leads to remote code execution on the web server. Version 4.2 patches the issue.
CVE-2021-47753 1 Phpkf 1 Cms 2026-01-23 N/A 9.8 CRITICAL
phpKF CMS 3.00 Beta y6 contains an unauthenticated file upload vulnerability that allows remote attackers to execute arbitrary code by bypassing file extension checks. Attackers can upload a PHP file disguised as a PNG, rename it, and execute system commands through a crafted web shell parameter.
CVE-2021-47757 1 Chikitsa 1 Patient Management System 2026-01-23 N/A 8.8 HIGH
Chikitsa Patient Management System 2.0.2 contains an authenticated remote code execution vulnerability in the backup restoration functionality. Authenticated attackers can upload a modified backup zip file with a malicious PHP shell to execute arbitrary system commands on the server.
CVE-2025-14894 1 Livewire-filemanager 1 Filemanager 2026-01-23 N/A 9.8 CRITICAL
Livewire Filemanager, commonly used in Laravel applications, contains LivewireFilemanagerComponent.php, which does not perform file type and MIME validation, allowing for RCE through upload of a malicious php file that can then be executed via the /storage/ URL if a commonly performed setup process within Laravel applications has been completed.
CVE-2025-37175 1 Arubanetworks 1 Arubaos 2026-01-23 N/A 7.2 HIGH
Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.
CVE-2024-9932 2026-01-23 N/A 9.8 CRITICAL
The Wux Blog Editor plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'wuxbt_insertImageNew' function in versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2024-50526 1 Lindeni 1 Multi Purpose Mail Form 2026-01-23 N/A 10.0 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in mahlamusa Multi Purpose Mail Form allows Upload a Web Shell to a Web Server.This issue affects Multi Purpose Mail Form: from n/a through 1.0.2.
CVE-2024-51791 2026-01-23 N/A 10.0 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server.This issue affects Forms: from n/a through 2.8.0.
CVE-2023-53889 1 Grabaperch 1 Perch 2026-01-23 N/A 7.2 HIGH
Perch CMS 3.2 contains a remote code execution vulnerability that allows authenticated administrators to upload arbitrary PHP files through the assets management interface. Attackers can upload a malicious .phar file with embedded system command execution capabilities to execute arbitrary commands on the server.
CVE-2025-15495 1 Biggidroid 1 Simple Php Cms 2026-01-22 5.8 MEDIUM 4.7 MEDIUM
A vulnerability was found in BiggiDroid Simple PHP CMS 1.0. This impacts an unknown function of the file /admin/editsite.php. The manipulation of the argument image results in unrestricted upload. The attack can be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-51793 1 Webfulcreations 1 Computer Repair Shop 2026-01-22 N/A 10.0 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in Webful Creations Computer Repair Shop allows Upload a Web Shell to a Web Server.This issue affects Computer Repair Shop: from n/a through 3.8115.
CVE-2023-51409 1 Meowapps 1 Ai Engine 2026-01-22 N/A 10.0 CRITICAL
Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affects AI Engine: ChatGPT Chatbot: from n/a through 1.9.98.
CVE-2022-50893 1 Viaviweb 1 Wallpaper Admin 2026-01-22 N/A 9.8 CRITICAL
VIAVIWEB Wallpaper Admin 1.0 contains an unauthenticated remote code execution vulnerability in the image upload functionality. Attackers can upload a malicious PHP file through the add_gallery_image.php endpoint to execute arbitrary code on the server.
CVE-2025-15503 1 Sangfor 1 Operation And Maintenance Security Management System 2026-01-22 7.5 HIGH 7.3 HIGH
A security flaw has been discovered in Sangfor Operation and Maintenance Management System up to 3.0.8. The impacted element is an unknown function of the file /fort/trust/version/common/common.jsp. Performing a manipulation of the argument File results in unrestricted upload. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-47259 1 Axis 2 Axis Os, Axis Os 2024 2026-01-22 N/A 3.5 LOW
Girishunawane, member of the AXIS OS Bug Bounty Program, has found that the VAPIX API dynamicoverlay.cgi did not have a sufficient input validation allowing for a possible command injection leading to being able to transfer files to the Axis device with the purpose to exhaust system resources. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
CVE-2025-66802 1 Covid-19 Contact Tracing System Project 1 Covid-19 Contact Tracing System 2026-01-22 N/A 9.8 CRITICAL
Sourcecodester Covid-19 Contact Tracing System 1.0 is vulnerable to RCE (Remote Code Execution). The application receives a reverse shell (php) into imagem of the user enabling RCE.
CVE-2025-66837 1 Softwareag 1 Aris 2026-01-21 N/A 6.8 MEDIUM
A file upload vulnerability in ARIS 10.0.23.0.3587512 allows attackers to execute arbitrary code via uploading a crafted PDF file/Malware