Description
A security flaw has been discovered in Bytedesk up to 1.3.9. This affects the function uploadFile of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestController.java of the component SVG File Handler. Performing a manipulation results in unrestricted upload. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.4.5.1 is able to mitigate this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is recommended.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Apply Patch
AI Analysis

Impact

The vulnerability in Bytedesk’s SVG File Handler allows an attacker to send a specially crafted file to the uploadFile endpoint, bypassing file type checks (CWE‑434) and missing authorization checks (CWE‑284). This results in the placement of arbitrary files on the server, which can be used to deliver malicious code, modify application data, or prepare for later exploitation steps. No advanced exploitation tools are required; the flaw itself provides a remote upload vector.

Affected Systems

Bytedesk versions 1.3.9 and earlier are vulnerable. The upstream repository shows that the issue was fixed in commit 975e39e4dd527596987559f56c5f9f973f64eff7 and the patch is included in release v1.4.5.1. No other vendors or product variants are listed in the available data.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of < 1% indicates a very low exploitation probability, suggesting that active attacks are unlikely. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by directing an HTTP POST to the uploadFile endpoint; the public exploit demonstrates this capability.

Generated by OpenCVE AI on April 18, 2026 at 09:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Bytedesk to version 1.4.5.1, which contains the commit that restores proper file validation and access controls.
  • If an immediate upgrade is not possible, temporarily disable the uploadFile endpoint or implement a narrow whitelist of MIME types and file extensions for uploads.
  • Add monitoring and logging around the upload endpoint to detect abnormal or unexpected file uploads and investigate any suspicious activity.

Generated by OpenCVE AI on April 18, 2026 at 09:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bytedesk:bytedesk:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Bytedesk
Bytedesk bytedesk
Vendors & Products Bytedesk
Bytedesk bytedesk

Sun, 08 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Bytedesk up to 1.3.9. This affects the function uploadFile of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestController.java of the component SVG File Handler. Performing a manipulation results in unrestricted upload. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.4.5.1 is able to mitigate this issue. The patch is named 975e39e4dd527596987559f56c5f9f973f64eff7. Upgrading the affected component is recommended.
Title Bytedesk SVG File UploadRestController.java uploadFile unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bytedesk Bytedesk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-11T19:34:42.331Z

Reserved: 2026-03-07T20:23:04.033Z

Link: CVE-2026-3748

cve-icon Vulnrichment

Updated: 2026-03-11T19:34:38.777Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-08T16:16:02.020

Modified: 2026-03-10T18:52:37.073

Link: CVE-2026-3748

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T09:45:25Z

Weaknesses