Executive Summary

Informations
Name CVE-2025-26260 First vendor Publication 2025-03-12
Vendor Cve Last vendor Modification 2025-03-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26260

Sources (Detail)

https://ahmetakan.com/2025/02/14/cve-2025-26260/
https://github.com/ahmetak4n/vulnerability-playground/tree/main/vulnerability...
https://github.com/plentico/plenti/releases/tag/v0.7.17
https://github.com/plentico/plenti/security/advisories/GHSA-mj4v-hp69-27x5
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2025-03-19 21:20:58
  • Multiple Updates
2025-03-12 21:20:28
  • First insertion