CVE-2026-2164
Awaiting Analysis Awaiting Analysis - Queue
Unrestricted File Upload in detronetdip E-commerce

Publication date: 2026-02-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in detronetdip E-commerce 1.0.0. This issue affects some unknown processing of the file /seller/assets/backend/profile/addadhar.php. Performing a manipulation of the argument File results in unrestricted upload. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
detronetdip e-commerce 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-2164 is a critical security flaw in detronetdip E-commerce version 1.0.0, specifically in the file /seller/assets/backend/profile/addadhar.php. The vulnerability arises from improper handling of file uploads, where the application relies solely on the client-supplied HTTP Content-Type header to validate uploaded files. This allows attackers to bypass validation by spoofing the MIME type.

Additionally, the application attempts to rename uploaded files but preserves the original file extension from the user-supplied filename. This enables attackers to upload malicious PHP files (such as web shells) with a .php extension, which are stored in a web-accessible directory without authentication or authorization checks.

As a result, attackers can remotely upload and execute arbitrary PHP code on the server, leading to full system compromise.


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can have severe impacts including full remote code execution on the affected server. Attackers can upload malicious PHP scripts that run with the web server's privileges, allowing them to execute arbitrary system commands."}, {'type': 'paragraph', 'content': "Potential impacts include unauthorized access to sensitive data such as system files and database credentials, installation of backdoors or malware for persistent access, and complete compromise of the affected system's confidentiality, integrity, and availability."}] [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking for the presence of the vulnerable file upload endpoint in the application, specifically the URL path /seller/assets/backend/profile/addadhar.php.'}, {'type': 'paragraph', 'content': 'Attackers can identify vulnerable targets using Google dorking with the query: inurl:seller/assets/backend/profile/addadhar.php.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts or presence of uploaded malicious files, monitoring HTTP requests that upload files with suspicious extensions (e.g., .php) or unusual Content-Type headers (e.g., image/jpeg spoofed) can help.'}, {'type': 'paragraph', 'content': 'A suggested command to test the vulnerability (proof of concept) using curl is:'}, {'type': 'list_item', 'content': 'curl -F "[email protected];type=image/jpeg" http://target/seller/assets/backend/profile/addadhar.php'}, {'type': 'paragraph', 'content': 'This command uploads a PHP web shell file while spoofing the Content-Type header to bypass MIME type checks.'}, {'type': 'paragraph', 'content': 'After uploading, accessing the uploaded file via HTTP can confirm exploitation by executing system commands remotely.'}] [1, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include:

  • Implement server-side MIME type verification using PHP functions like finfo_file or mime_content_type to verify the actual content of uploaded files.
  • Enforce strict file extension whitelisting, allowing only safe extensions such as jpg, jpeg, and png, and avoid using user-supplied extensions.
  • Generate new filenames with hardcoded safe extensions based on verified MIME types instead of preserving original file extensions.
  • Configure the web server (e.g., Apache .htaccess or Nginx configuration) to prevent execution of scripts in upload directories like /media/.
  • Add authentication and authorization checks before allowing file uploads to restrict access to authorized users only.

Since no official patch or response from the maintainers is available, consider replacing the affected software with a secure alternative if possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart