Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Oct 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Plenti
Plenti plenti
CPEs cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:*
Vendors & Products Plenti
Plenti plenti

Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00075}

epss

{'score': 0.00113}


Wed, 19 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Mar 2025 15:30:00 +0000

Type Values Removed Values Added
Description Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-03-19T18:59:02.952Z

Reserved: 2025-02-07T00:00:00.000Z

Link: CVE-2025-26260

cve-icon Vulnrichment

Updated: 2025-03-19T18:58:56.687Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-12T16:15:23.907

Modified: 2025-10-02T15:55:48.873

Link: CVE-2025-26260

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.