As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. 
Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension.
The README has been updated to include these guidelines.
            Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension.
The README has been updated to include these guidelines.
Metrics
Affected Vendors & Products
Advisories
    | Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2024-0433 | As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines. | 
  Github GHSA | 
                GHSA-v6f4-jwv9-682w | class.upload.php allows cross-site scripting attacks via uploaded files | 
Fixes
    Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
        History
                    Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 10 Oct 2024 16:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-20 | 
Thu, 10 Oct 2024 15:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines. | As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines. | 
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-06-03T14:42:21.494Z
Reserved: 2023-12-06T11:18:59.869Z
Link: CVE-2023-6551
Updated: 2024-08-02T08:35:14.672Z
Status : Modified
Published: 2024-01-04T16:15:09.380
Modified: 2025-06-03T15:15:51.720
Link: CVE-2023-6551
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD
 Github GHSA