CVE-2021-23814
MEDIUMUnisharp Laravel-filemanager < 2.6.2 - Code Injection
Title source: ruleDescription
This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: 1. Install a package with a web Laravel application. 2. Navigate to the Upload window 3. Upload an image file, then capture the request 4. Edit the request contents with a malicious file (webshell) 5. Enter the path of file uploaded on URL - Remote Code Execution **Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
References (7)
Core 7
Core References
Broken Link, Third Party Advisory
https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26
Third Party Advisory
https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199
Third Party Advisory
https://security.snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199
Issue Tracking
https://github.com/UniSharp/laravel-filemanager/issues/1113
Scores
CVSS v3
6.7
EPSS
0.0209
EPSS Percentile
84.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L
Details
CWE
CWE-434
CWE-94
Status
published
Products (2)
unisharp/laravel-filemanager
0 - 2.6.2Packagist
unisharp/laravel-filemanager
0.0.0
Published
Dec 17, 2021
Tracked Since
Feb 18, 2026