An arbitrary file upload vulnerability in the is_allowed_file_type() function of Filemanager v2.3.0 allows attackers to execute arbitrary code via uploading a crafted PHP file.
References
| Link | Resource |
|---|---|
| https://github.com/simogeo/Filemanager | Product |
| https://github.com/zakumini/CVE-List/blob/main/CVE-2025-46001/CVE-2025-46001.md | Exploit Third Party Advisory |
| https://www.exploit-db.com/exploits/38895 | Exploit |
| https://github.com/zakumini/CVE-List/blob/main/CVE-2025-46001/CVE-2025-46001.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-07-18 14:15
Updated : 2025-10-14 14:28
NVD link : CVE-2025-46001
Mitre link : CVE-2025-46001
CVE.ORG link : CVE-2025-46001
JSON object : View
Products Affected
simogeo
- filemanager
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
