CVE-2024-48782
CVE-2024-48782: File Upload vulnerability in DYCMS Open-Source v2.0.9.41 allows remote code execution. The application only checks image file extensions on the front-end, making it easy to bypass. This vulnerability could allow attackers to upload malicious files and compromise the entire system.
DYCMS Open-Source Version v2.0.9.41 is susceptible to a critical file upload vulnerability. Attackers can exploit this weakness to upload and execute arbitrary code due to insufficient server-side validation. With an SVRS of 30, this vulnerability is not considered as critical as others but still warrants attention. Successful exploitation grants an attacker the ability to gain control of the server, steal sensitive data, or launch further attacks. CWE-434 describes unrestricted upload of file type. This vulnerability is significant because it represents a common and easily exploitable attack vector.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.