Impact
JawherKl node-api-postgres contains a flaw in its Profile Picture Handler where the path.extname function is improperly used, allowing an attacker to upload any file type without restriction. This vulnerability leads to a remote file upload that could compromise confidentiality, integrity, and availability of the affected system. The weakness is linked to CWE-284 (Broken Access Control) and CWE-434 (Unrestricted Upload of File with Dangerous Type).
Affected Systems
The product affected is JawherKl node-api-postgres. All releases up to and including version 2.5 are vulnerable to this flaw.
Risk and Exploitability
The CVSS score is 6.9, indicating a moderate severity. The EPSS score is less than 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The exploitation is possible over the network via the file upload endpoint; an attacker can upload arbitrary files potentially leading to further compromise if the uploaded file is executed or used to access sensitive data.
OpenCVE Enrichment