Wallos <=2.38.2 has a file upload vulnerability in the restore database function, which allows unauthenticated users to restore database by uploading a ZIP file. The contents of the ZIP file are extracted on the server. This functionality enables an unauthenticated attacker to upload malicious files to the server. Once a web shell is installed, the attacker gains the ability to execute arbitrary commands.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-11495 | Wallos <=2.38.2 has a file upload vulnerability in the restore database function, which allows unauthenticated users to restore database by uploading a ZIP file. The contents of the ZIP file are extracted on the server. This functionality enables an unauthenticated attacker to upload malicious files to the server. Once a web shell is installed, the attacker gains the ability to execute arbitrary commands. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 04 Jun 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wallosapp
Wallosapp wallos |
|
| CPEs | cpe:2.3:a:wallosapp:wallos:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Wallosapp
Wallosapp wallos |
Thu, 17 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-73 | |
| Metrics |
cvssV3_1
|
Wed, 16 Apr 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Wallos <=2.38.2 has a file upload vulnerability in the restore database function, which allows unauthenticated users to restore database by uploading a ZIP file. The contents of the ZIP file are extracted on the server. This functionality enables an unauthenticated attacker to upload malicious files to the server. Once a web shell is installed, the attacker gains the ability to execute arbitrary commands. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-17T13:49:52.977Z
Reserved: 2024-12-06T00:00:00.000Z
Link: CVE-2024-55372
Updated: 2025-04-17T13:49:40.358Z
Status : Analyzed
Published: 2025-04-16T21:15:45.897
Modified: 2025-06-03T14:59:54.913
Link: CVE-2024-55372
No data.
OpenCVE Enrichment
No data.
EUVD