Chayawat Jeamprasertboon

4 exploits Active since Jul 2025
CVE-2025-56399 NOMISEC HIGH WRITEUP
alexusmai laravel-file-manager <3.3.1 - Authenticated RCE
alexusmai laravel-file-manager 3.3.1 and before allows an authenticated attacker to achieve Remote Code Execution (RCE) through a crafted file upload. A file with a '.png` extension containing PHP code can be uploaded via the file manager interface. Although the upload appears to fail client-side validation, the file is still saved on the server. The attacker can then use the rename API to change the file extension to `.php`, and upon accessing it via a public URL, the server executes the embedded code.
3 stars
CVSS 8.8
CVE-2025-46099 NOMISEC HIGH WRITEUP
Pluck - Unrestricted File Upload
In Pluck CMS 4.7.20-dev, an authenticated attacker can upload or create a crafted PHP file under the albums module directory and access it via the module routing logic in albums.site.php, resulting in arbitrary command execution through a GET parameter.
CVSS 7.2
CVE-2025-65345 NOMISEC MEDIUM WRITEUP
Alexusmai Laravel File Manager < 3.3.1 - Path Traversal
alexusmai laravel-file-manager 3.3.1 and below is vulnerable to Directory Traversal. The zip/archiving functionality allows an attacker to create archives containing files and directories outside the intended scope due to improper path validation.
CVSS 6.5
CVE-2025-63307 WRITEUP HIGH WRITEUP
alexusmai laravel-file-manager 3.3.1 - XSS
alexusmai laravel-file-manager 3.3.1 is vulnerable to Cross Site Scripting (XSS). The application permits user-controlled upload, create, and rename of files to HTML and SVG types and serves those files inline without adequate content-type validation or output sanitization.
CVSS 8.1