CVE-2025-34336
BaseFortify
Publication date: 2025-11-19
Last updated on: 2025-11-19
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| egovframework | egovframe-common-components | 4.3.1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in eGovFramework/egovframe-common-components versions up to 4.3.1 and allows unauthenticated attackers to upload files via specific image upload endpoints (/utl/wed/insertImage.do and /utl/wed/insertImageCk.do). The uploaded files are stored on the server and can be accessed via a download URL. Although there is a filename extension whitelist, attackers control the file contents and, in versions before 4.1.2, the MIME type of the served file is also attacker-controlled. Since version 4.1.2, non-image files are served with a fixed content type, but attackers can still use the application as a persistent file hosting service for arbitrary content without authentication.
How can this vulnerability impact me? :
This vulnerability can allow an unauthenticated attacker to upload arbitrary files to the server and host them persistently under the application's origin. This can lead to misuse of the application as a file hosting service, potentially enabling distribution of malicious content, unauthorized data storage, or other malicious activities without requiring authentication.