Skip to content
Threat Feed

Tag

File Upload

19 briefs RSS
critical advisory

WordPress User Registration Advanced Fields Plugin Arbitrary File Upload Vulnerability

The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, allowing unauthenticated attackers to upload arbitrary files leading to potential remote code execution.

User Registration Advanced Fields plugin <= 1.6.20 wordpress file-upload rce
2r 1t 1c
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload

Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.

Online Toolkits cve-2026-34415 rce file-upload web-application
2r 3t 1c
critical advisory

Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)

An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

SPM 2007 file-upload web-shell code-execution
2r 1t 1c
critical advisory

FlowiseAI File Upload Validation Bypass Leads to RCE

A file upload validation bypass vulnerability exists in FlowiseAI, where the Chatflow configuration file upload settings can be modified to allow the application/javascript MIME type, enabling an attacker to upload .js files, store malicious Node.js web shells on the server, and potentially achieve Remote Code Execution (RCE).

flowiseai file-upload rce web-shell
2r 2t 1c
critical advisory

Goshs File-Based ACL Authorization Bypass Vulnerability

Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.

authorization bypass acl file upload file deletion CVE-2026-40189
3r 4t 4i
high advisory

WordPress Plugin Vulnerability: Arbitrary File Upload in Gerador de Certificados – DevApps

The Gerador de Certificados – DevApps WordPress plugin is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress plugin file-upload remote-code-execution
2r 2t 1c
critical advisory

Ninja Forms File Upload Plugin Vulnerability Leads to RCE

The Ninja Forms File Uploads plugin for WordPress is vulnerable to unauthenticated arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

wordpress file-upload rce CVE-2026-0740
2r 2t 1c
critical advisory

Brave CMS Unrestricted File Upload Leads to Remote Code Execution

Brave CMS versions prior to 2.0.6 contain an unrestricted file upload vulnerability within the CKEditor upload functionality in the ckupload method, allowing authenticated users to upload executable PHP scripts and achieve Remote Code Execution.

cve-2026-35164 rce file-upload brave-cms ckeditor php webserver
2r 3t 1c
critical advisory

phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)

phpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.

phpBB file-upload deserialization CVE-2019-25685
2r 1c
high advisory

Technostrobe HI-LED-WR120-G2 Unrestricted File Upload Vulnerability (CVE-2026-5573)

CVE-2026-5573 allows remote attackers to perform unrestricted file uploads on Technostrobe HI-LED-WR120-G2 devices by manipulating the 'cwd' argument when interacting with the /fs file.

CVE-2026-5573 file-upload web-application
2r 1t 1c 4i
critical advisory

ShareFile Storage Zones Controller Unauthenticated Remote Code Execution via File Upload (CVE-2026-2701)

Authenticated users can upload malicious files to a ShareFile Storage Zones Controller server and execute them, leading to remote code execution, due to improper neutralization of special elements, code generation, and unrestricted file upload.

rce file-upload sharefile
2r 1t
critical advisory

Path Traversal Vulnerability in API File Upload Endpoint (CVE-2026-5027)

The 'POST /api/v2/files' endpoint is vulnerable to path traversal due to improper sanitization of the 'filename' parameter, potentially allowing attackers to write files to arbitrary locations on the filesystem and achieve remote code execution.

path-traversal file-upload cve-2026-5027 web-application
2r 3t
high advisory

Sharp Laravel Admin Panel Unrestricted File Upload Vulnerability

The code16/sharp Laravel admin panel package contains a vulnerability in its file upload endpoint that allows authenticated users to bypass all file type restrictions by manipulating the validation_rule parameter, potentially leading to Remote Code Execution (RCE) if the storage disk is configured to be publicly accessible.

laravel file-upload rce code16/sharp
2r 1t 5i
critical advisory

PhreeBooks ERP 5.2.3 Arbitrary File Upload Vulnerability

PhreeBooks ERP 5.2.3 is vulnerable to arbitrary file upload in the Image Manager component, allowing authenticated attackers to upload malicious PHP files leading to remote code execution.

phreebooks file-upload rce
2r 2t
high advisory

Census CSWeb 8.0.1 Arbitrary File Upload Vulnerability

A remote, authenticated attacker can exploit an arbitrary file upload vulnerability in Census CSWeb 8.0.1 (CVE-2025-60947) to upload malicious files, potentially leading to remote code execution.

file-upload remote-code-execution web-application
2r 2t
critical advisory

Breeze Cache Plugin Arbitrary File Upload Vulnerability (CVE-2026-3844)

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation, potentially leading to remote code execution.

Breeze Cache plugin wordpress plugin file-upload rce
2r 1t 1c
critical advisory

MindsDB Unrestricted File Upload Vulnerability (CVE-2026-7711)

CVE-2026-7711 allows for remote, unrestricted file uploads in MindsDB up to version 26.01 due to insufficient validation in the `exec` function of `proc_wrapper.py`, potentially leading to code execution or data exfiltration.

MindsDB cve vulnerability file-upload
2r 1t 1c
high advisory

WordPress Drag and Drop File Upload Plugin Vulnerable to Arbitrary File Upload (CVE-2026-5364)

The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to 1.1.3, allowing unauthenticated attackers to upload arbitrary PHP files by manipulating the file type parameter and exploiting extension sanitization vulnerabilities.

Drag and Drop File Upload for Contact Form 7 plugin wordpress file-upload rce plugin CVE-2026-5364
2r 1t 1c
critical advisory

Weaver E-office Unauthenticated Arbitrary File Upload Vulnerability

Weaver E-office versions prior to 10.0_20221201 are vulnerable to unauthenticated arbitrary file upload in the OfficeServer.php endpoint, allowing attackers to upload PHP webshells and achieve remote code execution.

E-office cve-2022-50993 file-upload webshell rce
2r 2t 1c