Subscriptions
No data.
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts. | |
| Title | Unsafe Client MIME Type Handling Can Enable Arbitrary File Upload in plank/laravel-mediable | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: TuranSec
Published:
Updated: 2026-03-26T13:41:27.981Z
Reserved: 2026-03-25T12:35:26.385Z
Link: CVE-2026-4809
Updated: 2026-03-26T13:41:24.248Z
Status : Awaiting Analysis
Published: 2026-03-26T11:16:21.440
Modified: 2026-03-26T15:13:15.790
Link: CVE-2026-4809
No data.
OpenCVE Enrichment
Updated: 2026-03-26T13:54:51Z