CVE-2024-42640
JavaScript vulnerability analysis and mitigation

Overview

CVE-2024-42640 affects angular-base64-upload library versions prior to v0.1.21. The vulnerability allows unauthenticated remote code execution via demo/server.php endpoint. This security issue was discovered during a penetration test and was disclosed on October 11, 2024. The vulnerability specifically impacts installations where the demo folder is present in the library installation (NVD, Zyenra).

Technical details

The vulnerability exists in the demo/server.php file which lacks proper file upload validations. The file takes two parameters, base64 and filename, as user input to upload files to the server, with uploaded content being saved in the demo/uploads directory. The vulnerability has received a CVSS v3.1 base score of 9.8 CRITICAL with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

Successful exploitation allows attackers to upload arbitrary content to the server through the demo/server.php endpoint, which can then be accessed via demo/uploads. This leads to remote code execution on the affected server, potentially giving attackers complete control over the system (Zyenra).

Mitigation and workarounds

To mitigate this vulnerability, organizations should update the angular-base64-upload library to version v0.1.21 or newer. Additionally, the demo folder should be removed from the angular-base64-upload installation directory. A verification script is available to identify and remove vulnerable components (ASEC, Zyenra).

Community reactions

The security community has noted that this vulnerability is particularly concerning due to its high severity rating and the potential for widespread impact. The issue was initially identified during a penetration test and was reported to MITRE after analysis showed potential widespread impact (Zyenra).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66456CRITICAL9.1
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-66457HIGH7.5
  • JavaScriptJavaScript
  • elysia
NoYesDec 09, 2025
CVE-2025-65849MEDIUM6.9
  • JavaScriptJavaScript
  • altcha
NoNoDec 08, 2025
CVE-2025-66202MEDIUM6.5
  • JavaScriptJavaScript
  • astro
NoYesDec 09, 2025
CVE-2025-14284MEDIUM5.1
  • JavaScriptJavaScript
  • @tiptap/extension-link
NoYesDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management