A vulnerability, which was classified as problematic, has been found in elunez eladmin up to 2.7. Affected by this issue is the function checkFile of the file /api/deploy/upload. The manipulation of the argument servers leads to deserialization. The attack may be launched remotely.
References
Link | Resource |
---|---|
https://github.com/elunez/eladmin/issues/873 | Exploit Issue Tracking Vendor Advisory |
https://vuldb.com/?ctiid.301502 | Permissions Required VDB Entry |
https://vuldb.com/?id.301502 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.522504 | Third Party Advisory VDB Entry |
Configurations
History
06 May 2025, 19:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/elunez/eladmin/issues/873 - Exploit, Issue Tracking, Vendor Advisory | |
References | () https://vuldb.com/?ctiid.301502 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.301502 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.522504 - Third Party Advisory, VDB Entry | |
Summary |
|
|
First Time |
Eladmin
Eladmin eladmin |
|
CPE | cpe:2.3:a:eladmin:eladmin:*:*:*:*:*:*:*:* |
27 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-27 16:15
Updated : 2025-05-06 19:07
NVD link : CVE-2025-2855
Mitre link : CVE-2025-2855
CVE.ORG link : CVE-2025-2855
JSON object : View
Products Affected
eladmin
- eladmin