Cyber Posture

CVE-2024-27480

CriticalPublic PoC

Published: 29 December 2025

Published
29 December 2025
Modified
02 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 42.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the insecure file upload by enforcing validation of uploaded files to block dangerous types and content.

prevent

Restricts file uploads to only permitted types, preventing attackers from uploading malicious files without authentication.

prevent

Remediates the specific flaw in VvvebJs 1.7.2 by identifying, patching, and deploying fixes for the unrestricted upload vulnerability.

Security SummaryAI

CVE-2024-27480 affects givanz VvvebJs version 1.7.2, where an insecure file upload vulnerability exists. This flaw, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), allows attackers to upload files without sufficient validation. The vulnerability received a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

Any remote attacker without authentication can exploit this vulnerability over the network with minimal effort. Successful exploitation enables the upload of malicious files, potentially leading to severe consequences such as remote code execution, data theft, modification of system files, or denial of service, as reflected in the high impact metrics across all three security principles.

Advisories reference GitHub Gists at https://gist.github.com/joaoviictorti/abb2d1929c29d09c13c60bb45f28a8ff, which likely contain proof-of-concept details for the insecure file upload in givanz VvvebJs 1.7.2. Security practitioners should review these for reproduction steps and apply updates if available from the vendor or implement input validation and file type restrictions as mitigations.

Details

CWE(s)

Affected Products

vvveb
vvvebjs
1.7.2

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Insecure file upload in public-facing web application enables unauthenticated remote exploitation for initial access (T1190) and facilitates deployment of web shells for code execution and persistence (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References