Description
Enabling Simple Ajax Uploader plugin included in Laragon open-source software allows for a remote code execution (RCE) attack via an improper input validation in a file_upload.php file which serves as an example. By default, Laragon is not vulnerable until a user decides to use the aforementioned plugin.
References (3)
Core 3
Core References
Product product
https://laragon.org/
Third Party Advisory third-party-advisory
https://cert.pl/en/posts/2024/02/CVE-2024-0864
Third Party Advisory third-party-advisory
https://cert.pl/posts/2024/02/CVE-2024-0864
Scores
CVSS v3
9.8
EPSS
0.0397
EPSS Percentile
88.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (1)
laragon/laragon
< 7.0.0
Published
Feb 29, 2024
Tracked Since
Feb 18, 2026