Files & Media
Path traversal, file upload validation, SVG JavaScript injection, EXIF data leaks, PDF generation attacks, Zip Slip, and MIME type mismatches.
7 vulnerabilities
Path Traversal
highFile paths constructed with unvalidated user input allow attackers to read or write arbitrary files on the server using ../ sequences.
File Upload No Validation
highAccepting file uploads without verifying type, size, or content allows attackers to upload malicious executables, web shells, or oversized files that crash the server.
SVG with JavaScript
mediumAccepting SVG uploads without sanitization allows attackers to embed JavaScript in SVG files, enabling XSS attacks when the SVG is rendered in a browser.
EXIF Not Stripped
lowImages served without stripping EXIF metadata can leak GPS coordinates, device information, timestamps, and other sensitive data about the person who took the photo.
PDF Generation Injection
mediumInjecting HTML or JavaScript into PDF generation templates allows attackers to read server-side files, make internal network requests, or execute scripts in the PDF viewer.
Zip Slip
highExtracting ZIP archives without validating file paths allows attackers to craft archives that write files outside the target directory, overwriting critical application files.
MIME Type Mismatch
mediumValidating file type only by extension instead of content allows attackers to upload malicious files with renamed extensions, bypassing security controls.