CVE-2026-33273
Received Received - Intake
Unrestricted File Upload in MATCHA INVOICE Allows Code Execution

Publication date: 2026-04-08

Last updated on: 2026-04-17

Assigner: JPCERT/CC

Description
Unrestricted upload of file with dangerous type issue exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, an arbitrary file may be created by an administrator of the product. As a result, arbitrary code may be executed on the server.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
icz matcha_invoice to 2.6.6 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-434 The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in MATCHA INVOICE version 2.6.6 and earlier, where there is an unrestricted upload of files with dangerous types. If exploited, an administrator of the product can create arbitrary files on the server.

As a result, arbitrary code may be executed on the server, potentially compromising the system.


How can this vulnerability impact me? :

If this vulnerability is exploited, it allows an administrator to upload arbitrary files that can lead to execution of arbitrary code on the server.

This can result in unauthorized actions, data compromise, or disruption of service on the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart