An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute arbitrary code via the dash_uploader/httprequesthandler.py, dash_uploader/upload.py in the Upload function and max_file_size parameter, dash_uploader/configure_upload.py components
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 08 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Arbitrary Code Execution via File Upload in fohrloop Dash-Uploader | |
| Weaknesses | CWE-78 CWE-94 |
Fri, 08 May 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute arbitrary code via the dash_uploader/httprequesthandler.py, dash_uploader/upload.py in the Upload function and max_file_size parameter, dash_uploader/configure_upload.py components | |
| References |
|
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T14:32:25.158Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-38361
No data.
Status : Awaiting Analysis
Published: 2026-05-08T15:16:37.120
Modified: 2026-05-08T16:08:15.570
Link: CVE-2026-38361
No data.
OpenCVE Enrichment
Updated: 2026-05-08T16:30:12Z
Weaknesses
No weakness.