CVE-2021-23814

high

Description

This affects versions of the package unisharp/laravel-filemanager before 2.6.2. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: 1. Install a package with a web Laravel application. 2. Navigate to the Upload window 3. Upload an image file, then capture the request 4. Edit the request contents with a malicious file (webshell) 5. Enter the path of file uploaded on URL - Remote Code Execution **Note:** Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).

References

https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199

https://security.snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199

https://github.com/UniSharp/laravel-filemanager/releases/tag/v2.6.2

https://github.com/UniSharp/laravel-filemanager/releases/tag/v2.5.1

https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975

https://github.com/UniSharp/laravel-filemanager/issues/1113

https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26

Details

Source: Mitre, NVD

Published: 2021-12-17

Updated: 2025-06-17

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High

EPSS

EPSS: 0.01147