An attacker could exploit this vulnerability by uploading...
Moderate severity
Unreviewed
Published
Aug 21, 2025
to the GitHub Advisory Database
•
Updated Aug 21, 2025
Description
Published by the National Vulnerability Database
Aug 21, 2025
Published to the GitHub Advisory Database
Aug 21, 2025
Last updated
Aug 21, 2025
An attacker could exploit this vulnerability by uploading arbitrary
files via the a specific endpoint, leading to unauthorized remote code
execution or system compromise.
References