Filtered by CWE-434
Total 3873 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-31210 1 Wordpress 2 Wordpress, Wordpress-develop 2026-01-07 7.7 High
WordPress is an open publishing platform for the Web. It's possible for a file of a type other than a zip file to be submitted as a new plugin by an administrative user on the Plugins -> Add New -> Upload Plugin screen in WordPress. If FTP credentials are requested for installation (in order to move the file into place outside of the `uploads` directory) then the uploaded file remains temporary available in the Media Library despite it not being allowed. If the `DISALLOW_FILE_EDIT` constant is set to `true` on the site _and_ FTP credentials are required when uploading a new theme or plugin, then this technically allows an RCE when the user would otherwise have no means of executing arbitrary PHP code. This issue _only_ affects Administrator level users on single site installations, and Super Admin level users on Multisite installations where it's otherwise expected that the user does not have permission to upload or execute arbitrary PHP code. Lower level users are not affected. Sites where the `DISALLOW_FILE_MODS` constant is set to `true` are not affected. Sites where an administrative user either does not need to enter FTP credentials or they have access to the valid FTP credentials, are not affected. The issue was fixed in WordPress 6.4.3 on January 30, 2024 and backported to versions 6.3.3, 6.2.4, 6.1.5, 6.0.7, 5.9.9, 5.8.9, 5.7.11, 5.6.13, 5.5.14, 5.4.15, 5.3.17, 5.2.20, 5.1.18, 5.0.21, 4.9.25, 2.8.24, 4.7.28, 4.6.28, 4.5.31, 4.4.32, 4.3.33, 4.2.37, and 4.1.40. A workaround is available. If the `DISALLOW_FILE_MODS` constant is defined as `true` then it will not be possible for any user to upload a plugin and therefore this issue will not be exploitable.
CVE-2025-51511 2 Cadmium, Cadmium-cms 2 Cadmium Cms, Cadmium Cms 2026-01-06 9.8 Critical
Cadmium CMS v.0.4.9 has a background arbitrary file upload vulnerability in /admin/content/filemanager/uploads.
CVE-2025-65806 1 E-point 2 Cms, E-point Cms 2026-01-05 8 High
The E-POINT CMS eagle.gsam-1169.1 file upload feature improperly handles nested archive files. An attacker can upload a nested ZIP (a ZIP containing another ZIP) where the inner archive contains an executable file (e.g. webshell.php). When the application extracts the uploaded archives, the executable may be extracted into a web-accessible directory. This can lead to remote code execution (RCE), data disclosure, account compromise, or further system compromise depending on the web server/process privileges. The issue arises from insufficient validation of archive contents and inadequate restrictions on extraction targets.
CVE-2024-27480 2 Givanz, Vvveb 2 Vvvebjs, Vvvebjs 2026-01-05 9.8 Critical
givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload.
CVE-2024-25182 2 Givanz, Vvveb 2 Vvvebjs, Vvvebjs 2026-01-05 9.8 Critical
givanz VvvebJs 1.7.2 suffers from a File Upload vulnerability via save.php.
CVE-2025-35032 2 Medical Informatics Engineering, Mieweb 2 Enterprise Health, Enterprise Health 2026-01-02 3.4 Low
Medical Informatics Engineering Enterprise Health allows authenticated users to upload arbitrary files. The impact of this behavior depends on how files are accessed. This issue is fixed as of 2025-04-08.
CVE-2024-24551 1 Bludit 1 Bludit 2026-01-02 8.8 High
A security vulnerability has been identified in Bludit, allowing authenticated attackers to execute arbitrary code through the Image API. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
CVE-2024-24550 1 Bludit 1 Bludit 2026-01-02 8.1 High
A security vulnerability has been identified in Bludit, allowing attackers with knowledge of the API token to upload arbitrary files through the File API which leads to arbitrary code execution on the server. This vulnerability arises from improper handling of file uploads, enabling malicious actors to upload and execute PHP files.
CVE-2025-66908 2 Turms, Turms-im 2 Ai Serving, Turms 2026-01-02 5.3 Medium
Turms AI-Serving module v0.10.0-SNAPSHOT and earlier contains an improper file type validation vulnerability in the OCR image upload functionality. The OcrController in turms-ai-serving/src/main/java/im/turms/ai/domain/ocr/controller/OcrController.java uses the @FormData(contentType = MediaTypeConst.IMAGE) annotation to restrict uploads to image files, but this constraint is not properly enforced. The system relies solely on client-provided Content-Type headers and file extensions without validating actual file content using magic bytes (file signatures). An attacker can upload arbitrary file types including executables, scripts, HTML, or web shells by setting the Content-Type header to "image/*" or using an image file extension. This bypass enables potential server-side code execution, stored XSS, or information disclosure depending on how uploaded files are processed and served.
CVE-2025-67164 1 Pagekit 1 Pagekit 2026-01-02 9.9 Critical
An authenticated arbitrary file upload vulnerability in the /storage/poc.php component of Pagekit CMS v1.0.18 allows attackers to execute arbitrary code via uploading a crafted PHP file.
CVE-2025-67289 1 Frappe 2 Erpnext, Frappe 2026-01-02 9.6 Critical
An arbitrary file upload vulnerability in the Attachments module of Frappe Framework v15.89.0 allows attackers to execute arbitrary code via uploading a crafted XML file.
CVE-2025-15226 1 Sun.net 1 Wmpro 2025-12-31 9.8 Critical
WMPro developed by Sunnet has a Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
CVE-2025-55061 2025-12-31 8.8 High
CWE-434 Unrestricted Upload of File with Dangerous Type
CVE-2025-15228 1 Welltend 1 Bpmflowwebkit 2025-12-31 9.8 Critical
BPMFlowWebkit developed by WELLTEND TECHNOLOGY has a Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution on the server.
CVE-2025-57460 1 Machsol 1 Machpanel 2025-12-31 9.8 Critical
File upload vulnerability in machsol machpanel 8.0.32 allows attacker to gain a webshell.
CVE-2025-14849 1 Advantech 2 Webaccess/scada, Webaccess\/scada 2025-12-31 8.8 High
Advantech WebAccess/SCADA  is vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code.
CVE-2019-16790 1 Prasathmani 1 Tiny File Manager 2025-12-31 6.5 Medium
In Tiny File Manager before 2.3.9, there is a remote code execution via Upload from URL and Edit/Rename files. Only authenticated users are impacted.
CVE-2022-45476 1 Prasathmani 1 Tiny File Manager 2025-12-31 9.8 Critical
Tiny File Manager version 2.4.8 executes the code of files uploaded by users of the application, instead of just returning them for download. This is possible because the application is vulnerable to insecure file upload.
CVE-2025-63678 2 Cms Made Simple, Cmsmadesimple 2 Cms Made Simple, File Manager 2025-12-31 3.8 Low
An authenticated arbitrary file upload vulnerability in the /uploads/ endpoint of CMS Made Simple Foundation File Manager v2.2.22 allows attackers with Administrator privileges to execute arbitrary code via uploading a crafted PHP file.
CVE-2023-53942 1 Leefish 1 File Thingie 2025-12-31 8.8 High
File Thingie 2.5.7 contains an authenticated file upload vulnerability that allows remote attackers to upload malicious PHP zip archives to the web server. Attackers can create a custom PHP payload, upload and unzip it, and then execute arbitrary system commands through a crafted PHP script with a command parameter.