Impact
The vulnerability lies in the handleFileUpload method of Bytedesk's SVG File Handler. The code does not validate file types or enforce access control, allowing attackers to upload any file, including malicious code. This can compromise the application's integrity, and the impact depends on the content of the uploaded files and subsequent interactions with the system.
Affected Systems
Bytedesk web application versions 1.3.9 and earlier are affected. The developers released version 1.4.5.1, which applies the fix. No other vendors or product variants are mentioned.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium severity, with an EPSS of less than 1% suggesting low but non‑zero exploitation probability. The vulnerability is accessible remotely via the upload endpoint and is not listed in the KEV catalog. Because the exploit code is publicly available, attackers with web access to the application could upload a crafted SVG or other file type to trigger the vulnerability.
OpenCVE Enrichment