Skip to content

Commit 8c67f57

Browse files
1 parent 7042018 commit 8c67f57

1 file changed

Lines changed: 10 additions & 2 deletions

File tree

advisories/github-reviewed/2025/12/GHSA-54mj-vcvj-q3v5/GHSA-54mj-vcvj-q3v5.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-54mj-vcvj-q3v5",
4-
"modified": "2026-01-03T00:24:47Z",
4+
"modified": "2026-01-22T16:53:47Z",
55
"published": "2025-12-22T21:30:33Z",
66
"aliases": [
77
"CVE-2025-67288"
88
],
99
"summary": "Umbraco CMS has an arbitrary file upload vulnerability",
10-
"details": "An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers to execute arbitrary code via uploading a crafted PDF file.",
10+
"details": "An arbitrary file upload vulnerability in Umbraco CMS v16.3.3 allows attackers to execute arbitrary code via uploading a crafted PDF file. While Umbraco provides [hooks to perform file validation](https://docs.umbraco.com/umbraco-cms/reference/security/serverside-file-validation), it does not do implement filtering by default. Users are expected to implement their own validation.\n\nNote: This vulnerability is [disputed by Ubraco](https://github.com/github/advisory-database/pull/6633).",
1111
"severity": [
1212
{
1313
"type": "CVSS_V3",
@@ -44,6 +44,14 @@
4444
"type": "ADVISORY",
4545
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67288"
4646
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/github/advisory-database/pull/6633"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://docs.umbraco.com/umbraco-cms/reference/security/serverside-file-validation"
54+
},
4755
{
4856
"type": "PACKAGE",
4957
"url": "https://github.com/umbraco/Umbraco-CMS"

0 commit comments

Comments
 (0)