
Cloud Vulnerability DB
A community-led vulnerabilities database
File Upload vulnerability in Feehi CMS through version 2.1.1 allows attackers to run arbitrary code via crafted image upload. The vulnerability was discovered and disclosed on July 3, 2021 (GitHub Issue).
The vulnerability exists in the image upload functionality of Feehi CMS. When uploading images through the text editor in the admin interface, the application fails to properly validate the file name of uploaded images, allowing for malicious file names that can lead to cross-site scripting (XSS) attacks (GitHub Issue).
Successful exploitation of this vulnerability could allow attackers to execute arbitrary code on the target system through crafted image uploads. This could potentially lead to complete system compromise if the attacker can achieve remote code execution (MITRE CVE).
Users should upgrade to a version newer than 2.1.1 if available. In the absence of a patch, administrators should implement strict file upload validation and sanitization of file names before processing any uploads (MITRE CVE).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."