Unrestricted File Upload in the Discussions tab in Operately v.0.1.0 allows a privileged user to achieve Remote Code Execution via uploading and executing malicious files without validating file extensions or content types.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00282}

epss

{'score': 0.00296}


Thu, 31 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Operately
Operately operately
Weaknesses CWE-434
CPEs cpe:2.3:a:operately:operately:*:*:*:*:*:*:*:*
Vendors & Products Operately
Operately operately
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 30 Oct 2024 20:30:00 +0000

Type Values Removed Values Added
Description Unrestricted File Upload in the Discussions tab in Operately v.0.1.0 allows a privileged user to achieve Remote Code Execution via uploading and executing malicious files without validating file extensions or content types.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-10-31T14:24:51.128Z

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48093

cve-icon Vulnrichment

Updated: 2024-10-31T14:23:52.656Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-30T21:15:14.337

Modified: 2024-11-01T12:57:03.417

Link: CVE-2024-48093

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.