Description
A security vulnerability has been detected in technical-laohu mpay up to 1.2.4. The impacted element is an unknown function of the component QR Code Image Handler. Such manipulation of the argument codeimg leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Published: 2026-01-19
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Apply Patch
AI Analysis

Impact

technical-laohu mpay’s QR Code Image Handler can be made to upload files without restriction. By manipulating the codeimg argument, an attacker can upload arbitrary files to the server via a remote request. The sole information provided states that the upload is unrestricted, implying that the server may accept dangerous file types and execute them, which could lead to a compromise of confidentiality, integrity, and availability. The vulnerability does not claim any privilege escalation beyond what the uploading actor already possesses, but the lack of validation is a significant weakness.

Affected Systems

Versions of technical‑laohu mpay up to and including 1.2.4 are affected. The vulnerable component is an unknown function within the QR Code Image Handler of this product. No other versions are mentioned, so the risk is confined to the stated release range.

Risk and Exploitability

The CVSS base score is 5.1, indicating moderate severity, and the EPSS score is below 1%, showing a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, and no official solution or workaround is published. Based on the description, the likely attack vector is remote, through a crafted HTTP request that supplies a malicious file via the codeimg parameter. Because the flaw permits uploading arbitrary files, an attacker could potentially place payloads that are later executed or used for data exfiltration, depending on the server’s configuration.

Generated by OpenCVE AI on April 18, 2026 at 05:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade technical‑laohu mpay to a patched release that limits the QR Code Image Handler to accept only predefined image types.
  • If a patch is not immediately available, enforce strict input validation: allow only image MIME types such as image/png and image/jpeg, reject script and executable types, and constrain file size.
  • Ensure the upload endpoint is protected by proper authentication and authorization controls so that only authorized users can perform uploads.
  • Monitor application logs for unexpected file uploads or permission changes and verify that uploaded files cannot be executed.

Generated by OpenCVE AI on April 18, 2026 at 05:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:technical-laohu:mpay:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Technical-laohu
Technical-laohu mpay
Vendors & Products Technical-laohu
Technical-laohu mpay

Mon, 19 Jan 2026 11:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in technical-laohu mpay up to 1.2.4. The impacted element is an unknown function of the component QR Code Image Handler. Such manipulation of the argument codeimg leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.
Title technical-laohu mpay QR Code Image unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Technical-laohu Mpay
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:45:24.624Z

Reserved: 2026-01-18T13:59:49.380Z

Link: CVE-2026-1152

cve-icon Vulnrichment

Updated: 2026-01-20T21:28:53.659Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-19T12:15:51.980

Modified: 2026-02-06T19:46:46.340

Link: CVE-2026-1152

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:30:25Z

Weaknesses