logo

GHSA-323w-6p85-26fr github.com/plentico/plenti

Package

Manager: go
Name: github.com/plentico/plenti
Vulnerable Version: <0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVSS v4.0: N/A

EPSS: N/A pctlN/A

Details

Duplicate Advisory: Plenti - Code Injection - Denial of Services # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-mj4v-hp69-27x5. This link is maintained to preserve external references. # Original Description Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.

Metadata

Created: 2025-03-12T18:32:53Z
Modified: 2025-03-12T21:58:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-323w-6p85-26fr/GHSA-323w-6p85-26fr.json
CWE IDs: ["CWE-94"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0