Impact
The vulnerability allows an authenticated attacker to upload arbitrary files, specifically PHP scripts, to the file manager via multipart form data. Executing one of these uploaded scripts gives the attacker the ability to run arbitrary PHP code on the server, compromising confidentiality, integrity, and availability of the system. The weakness is an arbitrary file upload flaw, identified as CWE-434.
Affected Systems
The affected product is UniSharp Laravel File Manager, versions 2.0.0-alpha7 and 2.0.
Risk and Exploitability
The CVSS score of 8.7 indicates high severity, but EPSS data is missing, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be through the web application interface of the upload endpoint, requiring authentication to the file manager. Once authenticated, an attacker can craft a multipart request to upload a PHP file and then trigger it via the working directory path.
OpenCVE Enrichment