GHSA-323w-6p85-26fr – github.com/plentico/plenti
Package
Manager: go
Name: github.com/plentico/plenti
Vulnerable Version: <0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: N/A
EPSS: N/A pctlN/A
Details
Duplicate Advisory: Plenti - Code Injection - Denial of Services # Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-mj4v-hp69-27x5. This link is maintained to preserve external references. # Original Description Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
Metadata
Created: 2025-03-12T18:32:53Z
Modified: 2025-03-12T21:58:24Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/03/GHSA-323w-6p85-26fr/GHSA-323w-6p85-26fr.json
CWE IDs: ["CWE-94"]
Alternative ID: N/A
Finding: N/A
Auto approve: 0