Description
EverShop 2.0.1 allows a remote unauthenticated attacker to upload arbitrary files and create directories via the /api/images endpoint. The endpoint is accessible without authentication by default, and server-side validation of uploaded files is insufficient. This can be abused to upload arbitrary content (including non-image files) which could impersonate user/admin login panels (exfiltrating credentials) and to perform a denial-of-service attack by exhausting disk space.
References (1)
Core 1
Core References
Exploit, Issue Tracking, Vendor Advisory
https://github.com/evershopcommerce/evershop/issues/819
Scores
CVSS v3
7.5
EPSS
0.0006
EPSS Percentile
20.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-434
Status
published
Products (1)
evershop/evershop
2.0.1
Published
Dec 02, 2025
Tracked Since
Feb 18, 2026