Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-6798 | Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution. |
Github GHSA |
GHSA-mj4v-hp69-27x5 | Plenti - Code Injection - Denial of Services |
Thu, 02 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Plenti
Plenti plenti |
|
| CPEs | cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Plenti
Plenti plenti |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 19 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Wed, 12 Mar 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-03-19T18:59:02.952Z
Reserved: 2025-02-07T00:00:00.000Z
Link: CVE-2025-26260
Updated: 2025-03-19T18:58:56.687Z
Status : Analyzed
Published: 2025-03-12T16:15:23.907
Modified: 2025-10-02T15:55:48.873
Link: CVE-2025-26260
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA