Arbitrary File Upload Affecting alexusmai/laravel-file-manager package, versions >=1.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.29% (53rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary File Upload vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-ALEXUSMAILARAVELFILEMANAGER-13743642
  • published29 Oct 2025
  • disclosed28 Oct 2025
  • creditChayawat Jeamprasertboon, Thanakorn Boontem, Theethat Thamwasin

Introduced: 28 Oct 2025

NewCVE-2025-56399  (opens in a new tab)
CWE-434  (opens in a new tab)

How to fix?

There is no fixed version for alexusmai/laravel-file-manager.

Overview

Affected versions of this package are vulnerable to Arbitrary File Upload via the file upload/rename API endpoints. An attacker can execute arbitrary code on the server by uploading a file with a .png or .pdf extension containing executable code, bypassing client-side validation, then using the rename API to change the extension to .php and accessing it through a public URL.

References

CVSS Base Scores

version 4.0
version 3.1