CVE-2024-42640

angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability...

Basic Information

CVE State
PUBLISHED
Reserved Date
August 05, 2024
Published Date
October 11, 2024
Last Updated
October 15, 2024
Vendor
adonespitogo
Product
angular-base64-upload
Description
angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Tags
php nuclei_scanner

CVSS Scores

CVSS v3.1

9.8 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

Score
88.77% (Percentile: 99.49%) as of 2025-07-03

SSVC Information

Exploitation
poc
Automatable
Yes
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (2025-06-26 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-06-27 12:01:47 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

KTN1990/CVE-2024-42640

Type: github • Created: 2024-11-19 23:54:30 UTC • Stars: 3

Unauthenticated Remote Code Execution via Angular-Base64-Upload Library (npm:bower)

rvizx/CVE-2024-42640

Type: github • Created: 2024-10-09 14:35:06 UTC • Stars: 25

Unauthenticated Remote Code Execution via Angular-Base64-Upload Library

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Detected by Nuclei

  • Added to KEVIntel