Skip to content

High-Risk Issue: File Upload Mechanism Accepts Arbitrary File Types Without Filtering #426

@mayur-bhawar

Description

@mayur-bhawar

The application allows users to upload any file type (e.g php, exe, html, svg) in
collection folders without validating file content, type, or extension.
• This allows attackers to upload executable or interpretable files that can be
executed or served by the server. If file upload is tied to public access or executed by
web app, it becomes a launching point for various client-side or server-side attacks.
Security Impact
• Lack of validation on file extension, MIME type, and content; missing server-side
enforcement causes this vulnerability.
• Leads to multiple attack vectors such as:

  • Remote Code Execution (if web shell is uploaded)
  • Stored XSS (via HTML/JS/SVG files)
  • Malware distribution (EXE/DLL upload)
  • File overwrite or path traversal

Image

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions