Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
References
| Link | Resource |
|---|---|
| https://ahmetakan.com/2025/02/14/cve-2025-26260/ | Exploit Third Party Advisory |
| https://github.com/ahmetak4n/vulnerability-playground/tree/main/vulnerability-research/CVE-2025-26260 | Exploit Third Party Advisory |
| https://github.com/plentico/plenti/releases/tag/v0.7.17 | Release Notes |
| https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 | Exploit Vendor Advisory |
| https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 | Exploit Vendor Advisory |
Configurations
History
No history.
Information
Published : 2025-03-12 16:15
Updated : 2025-10-02 15:55
NVD link : CVE-2025-26260
Mitre link : CVE-2025-26260
CVE.ORG link : CVE-2025-26260
JSON object : View
Products Affected
plenti
- plenti
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
