CVE-2026-2164
Unrestricted File Upload in detronetdip E-commerce
Publication date: 2026-02-08
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| detronetdip | e-commerce | 1.0.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
| CWE-284 | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-2164 is a critical security flaw in detronetdip E-commerce version 1.0.0, specifically in the file /seller/assets/backend/profile/addadhar.php. The vulnerability arises from improper handling of file uploads, where the application relies solely on the client-supplied HTTP Content-Type header to validate uploaded files. This allows attackers to bypass validation by spoofing the MIME type.
Additionally, the application attempts to rename uploaded files but preserves the original file extension from the user-supplied filename. This enables attackers to upload malicious PHP files (such as web shells) with a .php extension, which are stored in a web-accessible directory without authentication or authorization checks.
As a result, attackers can remotely upload and execute arbitrary PHP code on the server, leading to full system compromise.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This vulnerability can have severe impacts including full remote code execution on the affected server. Attackers can upload malicious PHP scripts that run with the web server's privileges, allowing them to execute arbitrary system commands."}, {'type': 'paragraph', 'content': "Potential impacts include unauthorized access to sensitive data such as system files and database credentials, installation of backdoors or malware for persistent access, and complete compromise of the affected system's confidentiality, integrity, and availability."}] [1, 2, 3]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking for the presence of the vulnerable file upload endpoint in the application, specifically the URL path /seller/assets/backend/profile/addadhar.php.'}, {'type': 'paragraph', 'content': 'Attackers can identify vulnerable targets using Google dorking with the query: inurl:seller/assets/backend/profile/addadhar.php.'}, {'type': 'paragraph', 'content': 'To detect exploitation attempts or presence of uploaded malicious files, monitoring HTTP requests that upload files with suspicious extensions (e.g., .php) or unusual Content-Type headers (e.g., image/jpeg spoofed) can help.'}, {'type': 'paragraph', 'content': 'A suggested command to test the vulnerability (proof of concept) using curl is:'}, {'type': 'list_item', 'content': 'curl -F "[email protected];type=image/jpeg" http://target/seller/assets/backend/profile/addadhar.php'}, {'type': 'paragraph', 'content': 'This command uploads a PHP web shell file while spoofing the Content-Type header to bypass MIME type checks.'}, {'type': 'paragraph', 'content': 'After uploading, accessing the uploaded file via HTTP can confirm exploitation by executing system commands remotely.'}] [1, 3]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include:
- Implement server-side MIME type verification using PHP functions like finfo_file or mime_content_type to verify the actual content of uploaded files.
- Enforce strict file extension whitelisting, allowing only safe extensions such as jpg, jpeg, and png, and avoid using user-supplied extensions.
- Generate new filenames with hardcoded safe extensions based on verified MIME types instead of preserving original file extensions.
- Configure the web server (e.g., Apache .htaccess or Nginx configuration) to prevent execution of scripts in upload directories like /media/.
- Add authentication and authorization checks before allowing file uploads to restrict access to authorized users only.
Since no official patch or response from the maintainers is available, consider replacing the affected software with a secure alternative if possible.