<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Code16/Sharp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/code16/sharp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 25 Mar 2026 20:03:11 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/code16/sharp/feed.xml" rel="self" type="application/rss+xml"/><item><title>Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-06-sharp-file-upload-bypass/</link><pubDate>Wed, 25 Mar 2026 20:03:11 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-sharp-file-upload-bypass/</guid><description>The code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.</description><content:encoded><![CDATA[<p>The <code>code16/sharp</code> Laravel admin panel package, specifically versions before 9.20.0, is vulnerable to unrestricted file upload. An authenticated user can manipulate the <code>validation_rule</code> parameter in the <code>/api/form/upload</code> endpoint to bypass file type restrictions. This vulnerability stems from insufficient server-side validation of the client-supplied <code>validation_rule</code>, which is directly passed to the Laravel validator. Successfully exploiting this vulnerability allows an attacker to upload arbitrary files, including PHP webshells, which can lead to remote code execution (RCE) if the storage disk is publicly accessible. The vulnerability was reported by zaurgsynv and has been patched in pull request #714. Defenders should ensure their Sharp instances are updated to version 9.20.0 or later, and restrict disk access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the Sharp Laravel admin panel.</li>
<li>The user navigates to a section of the application that utilizes the file upload functionality.</li>
<li>The user intercepts the HTTP request sent to the <code>/api/form/upload</code> endpoint.</li>
<li>The user modifies the request body, specifically the <code>validation_rule</code> parameter, setting it to <code>validation_rule[]=file</code>.</li>
<li>The modified request is sent to the server, bypassing MIME type and file extension checks.</li>
<li>The server processes the upload request, saving the arbitrary file (e.g., a PHP webshell) to the designated storage disk.</li>
<li>If the storage disk is publicly accessible, the attacker can access the uploaded file via a web browser.</li>
<li>The attacker executes the uploaded PHP webshell, achieving remote code execution (RCE) on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to upload arbitrary files, including PHP webshells, to the affected server. This can lead to Remote Code Execution (RCE) if the server&rsquo;s storage disk is misconfigured to be publicly accessible. While default configurations prevent direct execution of uploaded PHP files, compromised servers can be leveraged for lateral movement, data exfiltration, or further malicious activities. This vulnerability impacts all installations of <code>code16/sharp</code> prior to version 9.20.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>code16/sharp</code> to version 9.20.0 or later to remediate CVE-2026-33687.</li>
<li>Ensure that the storage disk used for Sharp uploads is strictly private, as described in the Laravel filesystem documentation (<a href="https://laravel.com/docs/13.x/filesystem)">https://laravel.com/docs/13.x/filesystem)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Sharp File Upload Bypass Attempt&rdquo; to identify attempts to exploit this vulnerability based on the <code>validation_rule</code> parameter.</li>
<li>Monitor web server logs for suspicious file uploads to the <code>/api/form/upload</code> endpoint, correlating with user activity and file extensions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>laravel</category><category>file-upload</category><category>rce</category><category>code16/sharp</category></item></channel></rss>