Description
An issue was discovered in Znuny and Znuny LTS 6.0.31 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in user can upload a file (via a manipulated AJAX Request) to an arbitrary writable location by traversing paths. Arbitrary code can be executed if this location is publicly available through the web server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://www.znuny.org/en/advisories/zsa-2024-01 |
|
| https://znuny.com |
|
History
Wed, 25 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:znuny:znuny:6.0.31:*:*:*:lts:*:*:* cpe:2.3:a:znuny:znuny:7.0.1:*:*:*:-:*:*:* |
|
| Metrics |
ssvc
|
Tue, 02 Sep 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:znuny:znuny:*:*:*:*:-:*:*:* cpe:2.3:a:znuny:znuny:*:*:*:*:lts:*:*:* |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T02:13:39.090Z
Reserved: 2024-04-15T00:00:00.000Z
Link: CVE-2024-32491
Updated: 2024-08-02T02:13:39.090Z
Status : Analyzed
Published: 2024-04-29T17:15:19.183
Modified: 2025-09-02T21:21:38.100
Link: CVE-2024-32491
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:09:57Z
Weaknesses