Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
| Package (Ecosystem) | Introduced | Fixed | Limit |
|---|---|---|---|
| github.com/plentico/plenti(Go) | 0 | 0.7.17 | N/A |
CVSS Metrics