File Thingie
Sign in to watchby Leefish
Source repositories
CVEs (4)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-25471 | Cri | 0.64 | 9.8 | 0.01 | Mar 11, 2026 | FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files containing PHP shells, use the unzip functionality to extract them into accessible directories, and execute arbitrary commands through the extracted PHP files. | |
| CVE-2026-30579 | Med | 0.42 | 6.5 | 0.00 | Mar 20, 2026 | File Thingie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "upload file" functionality to upload a file with a crafted file name used to trigger a Javascript payload. | |
| CVE-2026-30578 | Med | 0.42 | 6.5 | 0.00 | Mar 20, 2026 | File Thinghie 2.5.7 is vulnerable to Cross Site Scripting (XSS). A malicious user can leverage the "dir" parameter of the GET request to invoke arbitrary javascript code. | |
| CVE-2026-30580 | Med | 0.28 | 4.3 | 0.00 | Mar 20, 2026 | File Thingie 2.5.7 is vulnerable to Directory Traversal. A malicious user can leverage the "create folder from url" functionality of the application to read arbitrary files on the target system. |