Description
A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
References (4)
Core 4
Core References
Permissions Required, Third Party Advisory vdb-entry
technical-description
https://vuldb.com/?id.273273
Permissions Required, Third Party Advisory signature
permissions-required
https://vuldb.com/?ctiid.273273
Third Party Advisory third-party-advisory
https://vuldb.com/?submit.380092
Exploit, Third Party Advisory exploit
issue-tracking
https://github.com/Hebing123/cve/issues/62
Scores
CVSS v3
3.5
EPSS
0.0008
EPSS Percentile
24.5%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-434
Status
published
Products (1)
baidu/ueditor
< 1.4.3.3
Published
Aug 01, 2024
Tracked Since
Feb 18, 2026