Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
References
Link | Resource |
---|---|
https://ahmetakan.com/2025/02/14/cve-2025-26260/ | Exploit Third Party Advisory |
https://github.com/ahmetak4n/vulnerability-playground/tree/main/vulnerability-research/CVE-2025-26260 | Exploit Third Party Advisory |
https://github.com/plentico/plenti/releases/tag/v0.7.17 | Release Notes |
https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 | Exploit Vendor Advisory |
https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 | Exploit Vendor Advisory |
Configurations
History
02 Oct 2025, 15:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Plenti
Plenti plenti |
|
CPE | cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:* | |
References | () https://ahmetakan.com/2025/02/14/cve-2025-26260/ - Exploit, Third Party Advisory | |
References | () https://github.com/ahmetak4n/vulnerability-playground/tree/main/vulnerability-research/CVE-2025-26260 - Exploit, Third Party Advisory | |
References | () https://github.com/plentico/plenti/releases/tag/v0.7.17 - Release Notes | |
References | () https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 - Exploit, Vendor Advisory |
19 Mar 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5 - | |
Summary |
|
|
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
12 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-12 16:15
Updated : 2025-10-02 15:55
NVD link : CVE-2025-26260
Mitre link : CVE-2025-26260
CVE.ORG link : CVE-2025-26260
JSON object : View
Products Affected
plenti
- plenti
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')