CVE-2024-46210

An arbitrary file upload vulnerability in the MediaPool module of Redaxo CMS v5.17.1 allows attackers to execute arbitrary code via uploading a crafted file.
Configurations

Configuration 1 (hide)

cpe:2.3:a:redaxo:redaxo:5.17.1:*:*:*:*:*:*:*

History

13 Jun 2025, 18:24

Type Values Removed Values Added
First Time Redaxo redaxo
Redaxo
CPE cpe:2.3:a:redaxo:redaxo:5.17.1:*:*:*:*:*:*:*
References () https://gist.github.com/h4ckr4v3n/26eaa57d94f749b597ede8b404c234df - () https://gist.github.com/h4ckr4v3n/26eaa57d94f749b597ede8b404c234df - Third Party Advisory
References () https://github.com/h4ckr4v3n/research_redaxo_5_17_1.git - () https://github.com/h4ckr4v3n/research_redaxo_5_17_1.git - Third Party Advisory

31 Jan 2025, 17:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CWE CWE-434
Summary
  • (es) Una vulnerabilidad de carga de archivos arbitrarios en el módulo MediaPool de Redaxo CMS v5.17.1 permite a los atacantes ejecutar código arbitrario mediante la carga de un archivo manipulado específicamente.

10 Jan 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-10 16:15

Updated : 2025-06-13 18:24


NVD link : CVE-2024-46210

Mitre link : CVE-2024-46210

CVE.ORG link : CVE-2024-46210


JSON object : View

Products Affected

redaxo

  • redaxo
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type