An arbitrary file upload vulnerability in the Profile Image module of Kirby CMS v4.1.0 allows attackers to execute arbitrary code via a crafted PDF file.
References
| Link | Resource |
|---|---|
| https://github.com/getkirby/kirby/security/advisories/GHSA-xrvh-rvc4-5m43 | Third Party Advisory |
| https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-Unrestricted-File-Upload-dc60ce3132f04442b73f2dba2631fae0?pvs=4 | Exploit Third Party Advisory |
| https://github.com/getkirby/kirby/security/advisories/GHSA-xrvh-rvc4-5m43 | Third Party Advisory |
| https://shrouded-trowel-50c.notion.site/Kirby-CMS-4-1-0-Unrestricted-File-Upload-dc60ce3132f04442b73f2dba2631fae0?pvs=4 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-02-22 05:15
Updated : 2025-04-08 14:35
NVD link : CVE-2024-26483
Mitre link : CVE-2024-26483
CVE.ORG link : CVE-2024-26483
JSON object : View
Products Affected
getkirby
- kirby
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
