Snyk has a proof-of-concept or detailed explanation of how to exploit this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Unrestricted Upload of File with Dangerous Type vulnerabilities in an interactive lesson.
Start learningUpgrade admidio/admidio
to version 4.3.10 or higher.
admidio/admidio is a free open source user management system for websites of organizations and groups.
Affected versions of this package are vulnerable to Unrestricted Upload of File with Dangerous Type due to the lack of file extension verification in the Message
module, where it is possible to upload a PHP file in the attachment. An attacker can upload a PHP web shell that executes OS commands on the server, compromising the application server.