Description
An arbitrary file upload vulnerability in the file upload module of express-fileupload 1.3.1 allows attackers to execute arbitrary code via a crafted PHP file. NOTE: the vendor's position is that the observed behavior can only occur with "intentional misusing of the API": the express-fileupload middleware is not responsible for an application's business logic (e.g., determining whether or how a file should be renamed).
References (3)
Core 3
Core References
Third Party Advisory
https://github.com/richardgirges/express-fileupload/issues/312#issuecomment-1134912967
Third Party Advisory
https://github.com/richardgirges/express-fileupload/issues/329#issuecomment-1387288644
Exploit, Third Party Advisory
https://www.youtube.com/watch?v=4XpofFi84KI
Scores
CVSS v3
9.8
EPSS
0.0048
EPSS Percentile
65.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-434
Status
published
Products (1)
express-fileupload_project/express-fileupload
1.3.1
Published
Apr 12, 2022
Tracked Since
Feb 18, 2026