Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hytalemodding
Hytalemodding wiki |
|
| Vendors & Products |
Hytalemodding
Hytalemodding wiki |
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Hytale Modding Wiki is a free service for Hytale mods to host their documentation & wikis. In version 1.2.0 and prior, the quickUpload() endpoint validates uploaded files by checking their MIME type (via PHP's finfo, which inspects file contents) but constructs the stored filename using the client-supplied file extension from getClientOriginalExtension(). These two checks are independent: an attacker can upload a file whose content passes the MIME allowlist while using a .php extension. The file is stored on the public disk and is directly accessible via URL, allowing server-side code execution. At time of publication no known patches exist. | |
| Title | Hytale Modding Vulnerable to Remote Code Execution via File Upload Bypass in `FileController` | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T19:14:04.735Z
Reserved: 2026-03-30T18:41:20.754Z
Link: CVE-2026-34735
Updated: 2026-04-02T19:14:00.137Z
Status : Deferred
Published: 2026-04-02T19:21:32.723
Modified: 2026-04-16T14:45:19.723
Link: CVE-2026-34735
No data.
OpenCVE Enrichment
Updated: 2026-04-03T09:16:48Z