Vulnerabilities (CVE)

Filtered by CWE-434
Total 2945 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-45548 1 Ayacms Project 1 Ayacms 2025-04-23 N/A 8.8 HIGH
AyaCMS v3.1.2 has an Arbitrary File Upload vulnerability.
CVE-2022-44289 1 Thinkphp 1 Thinkphp 2025-04-23 N/A 8.8 HIGH
Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell.
CVE-2022-45275 1 Dynamic Transaction Queuing System Project 1 Dynamic Transaction Queuing System 2025-04-23 N/A 7.2 HIGH
An arbitrary file upload vulnerability in /queuing/admin/ajax.php?action=save_settings of Dynamic Transaction Queuing System v1.0 allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-45009 1 Online Leave Management System Project 1 Online Leave Management System 2025-04-23 N/A 7.2 HIGH
Online Leave Management System v1.0 was discovered to contain an arbitrary file upload vulnerability at /leave_system/classes/SystemSettings.php?f=update_settings. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2025-3616 2025-04-23 N/A 8.8 HIGH
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gspb_make_proxy_api_request() function in versions 11.4 to 11.4.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The arbitrary file upload was sufficiently patched in 11.4.5, but a capability check was added in 11.4.6 to properly prevent unauthorized limited file uploads.
CVE-2024-48454 1 Oretnom23 1 Purchase Order Management System 2025-04-23 N/A 7.2 HIGH
An issue in SourceCodester Purchase Order Management System v1.0 allows a remote attacker to execute arbitrary code via the /admin?page=user component
CVE-2025-29394 2025-04-22 N/A 8.1 HIGH
An insecure permissions vulnerability in verydows v2.0 allows a remote attacker to execute arbitrary code by uploading a file type.
CVE-2022-45968 1 Alist Project 1 Alist 2025-04-22 N/A 8.8 HIGH
Alist v3.4.0 is vulnerable to File Upload. A user with only file upload permission can upload any file to any folder (even a password protected one).
CVE-2022-45759 1 Sens Project 1 Sens 2025-04-22 N/A 8.8 HIGH
SENS v1.0 has a file upload vulnerability.
CVE-2024-40071 1 Oretnom23 1 Online Id Generator System 2025-04-22 N/A 9.8 CRITICAL
Sourcecodester Online ID Generator System 1.0 was discovered to contain an arbitrary file upload vulnerability via id_generator/classes/SystemSettings.php?f=update_settings. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.
CVE-2022-3912 1 Wpeverest 1 User Registration 2025-04-22 N/A 7.5 HIGH
The User Registration WordPress plugin before 2.2.4.1 does not properly restrict the files to be uploaded via an AJAX action available to both unauthenticated and authenticated users, which could allow unauthenticated users to upload PHP files for example.
CVE-2022-3989 1 Stylemixthemes 1 Motors - Car Dealer\, Classifieds \& Listing 2025-04-22 N/A 8.8 HIGH
The Motors WordPress plugin before 1.4.4 does not properly validate uploaded files for dangerous file types (such as .php) in an AJAX action, allowing an attacker to sign up on a victim's WordPress instance, upload a malicious PHP file and attempt to launch a brute-force attack to discover the uploaded payload.
CVE-2022-3982 1 Wpdevart 1 Booking Calendar 2025-04-22 N/A 9.8 CRITICAL
The Booking calendar, Appointment Booking System WordPress plugin before 3.2.2 does not validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE
CVE-2022-3921 1 Themographics 1 Listingo 2025-04-22 N/A 9.8 CRITICAL
The Listingo WordPress theme before 3.2.7 does not validate files to be uploaded via an AJAX action available to unauthenticated users, which could allow them to upload arbitrary files and lead to RCE
CVE-2024-12956 1 1000projects 1 Portfolio Management System Mca 2025-04-22 6.5 MEDIUM 6.3 MEDIUM
A vulnerability was found in 1000 Projects Portfolio Management System MCA 1.0 and classified as critical. This issue affects some unknown processing of the file /add_achievement_details.php. The manipulation of the argument ach_certy leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-12954 1 1000projects 1 Portfolio Management System Mca 2025-04-22 6.5 MEDIUM 6.3 MEDIUM
A vulnerability, which was classified as critical, was found in 1000 Projects Portfolio Management System MCA 1.0. This affects an unknown part of the file /update_ach.php. The manipulation of the argument ach_certy leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-12953 1 1000projects 1 Portfolio Management System Mca 2025-04-22 6.5 MEDIUM 6.3 MEDIUM
A vulnerability, which was classified as critical, has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected by this issue is some unknown functionality of the file /update_pd_process.php. The manipulation of the argument profile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
CVE-2024-12951 1 1000projects 1 Portfolio Management System Mca 2025-04-22 6.5 MEDIUM 6.3 MEDIUM
A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /add_personal_details.php. The manipulation of the argument profile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVE-2020-20588 1 Ibarn Project 1 Ibarn 2025-04-21 N/A 8.8 HIGH
File upload vulnerability in function upload in action/Core.class.php in zhimengzhe iBarn 1.5 allows remote attackers to run arbitrary code via avatar upload to index.php.
CVE-2024-56828 1 1000mz 1 Chestnutcms 2025-04-21 N/A 9.8 CRITICAL
File Upload vulnerability in ChestnutCMS through 1.5.0. Based on the code analysis, it was determined that the /api/member/avatar API endpoint receives a base64 string as input. This string is then passed to the memberService.uploadAvatarByBase64 method for processing. Within the service, the base64-encoded image is parsed. For example, given a string like: data:image/html;base64,PGh0bWw+PGltZyBzcmM9eCBvbmVycm9yPWFsZXJ0KDEpPjwvaHRtbD4= the content after the comma is extracted and decoded using Base64.getDecoder().decode(). The substring from the 11th character up to the first occurrence of a semicolon (;) is assigned to the suffix variable (representing the file extension). The decoded content is then written to a file. However, the file extension is not validated, and since this functionality is exposed to the frontend, it poses significant security risks.