Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 26 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts. | |
| Title | Unsafe Client MIME Type Handling Can Enable Arbitrary File Upload in plank/laravel-mediable | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TuranSec
Published:
Updated: 2026-03-26T13:41:27.981Z
Reserved: 2026-03-25T12:35:26.385Z
Link: CVE-2026-4809
Updated: 2026-03-26T13:41:24.248Z
Status : Awaiting Analysis
Published: 2026-03-26T11:16:21.440
Modified: 2026-03-26T15:13:15.790
Link: CVE-2026-4809
No data.
OpenCVE Enrichment
Updated: 2026-03-26T13:54:51Z