Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alexusmai
Alexusmai laravel-file-manager Laravel Laravel laravel |
|
| Vendors & Products |
Alexusmai
Alexusmai laravel-file-manager Laravel Laravel laravel |
Tue, 28 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | alexusmai laravel-file-manager 3.3.1 and before allows an authenticated attacker to achieve Remote Code Execution (RCE) through a crafted file upload. A file with a '.png` extension containing PHP code can be uploaded via the file manager interface. Although the upload appears to fail client-side validation, the file is still saved on the server. The attacker can then use the rename API to change the file extension to `.php`, and upon accessing it via a public URL, the server executes the embedded code. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-29T14:17:01.200Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56399
Updated: 2025-10-29T14:16:55.300Z
Status : Awaiting Analysis
Published: 2025-10-28T16:15:38.543
Modified: 2025-10-30T15:05:32.197
Link: CVE-2025-56399
No data.
OpenCVE Enrichment
Updated: 2025-10-29T10:58:38Z