Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-mw8w-q3f7-2v85 | Podinfo affected by Arbitrary File Upload that leads to Stored Cross-Site Scripting (XSS) |
Wed, 11 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Stefanprodan
Stefanprodan podinfo |
|
| CPEs | cpe:2.3:a:stefanprodan:podinfo:*:*:*:*:*:kubernetes:*:* | |
| Vendors & Products |
Stefanprodan
Stefanprodan podinfo |
Thu, 05 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 04 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-434 CWE-79 |
|
| Metrics |
cvssV3_1
|
Tue, 03 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Arbitrary File Upload in podinfo thru 6.9.0 allows unauthenticated attackers to upload arbitrary files via crafted POST request to the /store endpoint. The application renders uploaded content without a restrictive Content-Security-Policy (CSP) or adequate Content-Type validation, leading to Stored Cross-Site Scripting (XSS). | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-05T15:04:46.555Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70849
Updated: 2026-02-04T15:02:23.229Z
Status : Analyzed
Published: 2026-02-03T18:16:18.260
Modified: 2026-02-11T15:30:39.787
Link: CVE-2025-70849
No data.
OpenCVE Enrichment
No data.
Github GHSA