Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-94 | |
| Metrics |
cvssV3_1
|
Wed, 29 Oct 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alexusmai
Alexusmai laravel-file-manager Laravel Laravel laravel |
|
| Vendors & Products |
Alexusmai
Alexusmai laravel-file-manager Laravel Laravel laravel |
Tue, 28 Oct 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | alexusmai laravel-file-manager 3.3.1 and before allows an authenticated attacker to achieve Remote Code Execution (RCE) through a crafted file upload. A file with a '.png` extension containing PHP code can be uploaded via the file manager interface. Although the upload appears to fail client-side validation, the file is still saved on the server. The attacker can then use the rename API to change the file extension to `.php`, and upon accessing it via a public URL, the server executes the embedded code. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-10-29T14:17:01.200Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56399
Updated: 2025-10-29T14:16:55.300Z
Status : Deferred
Published: 2025-10-28T16:15:38.543
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-56399
No data.
OpenCVE Enrichment
Updated: 2025-10-29T10:58:38Z