CVE-2024-27480
Published: 29 December 2025
Description
givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the insecure file upload by enforcing validation of uploaded files to block dangerous types and content.
Restricts file uploads to only permitted types, preventing attackers from uploading malicious files without authentication.
Remediates the specific flaw in VvvebJs 1.7.2 by identifying, patching, and deploying fixes for the unrestricted upload vulnerability.
Security SummaryAI
CVE-2024-27480 affects givanz VvvebJs version 1.7.2, where an insecure file upload vulnerability exists. This flaw, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), allows attackers to upload files without sufficient validation. The vulnerability received a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.
Any remote attacker without authentication can exploit this vulnerability over the network with minimal effort. Successful exploitation enables the upload of malicious files, potentially leading to severe consequences such as remote code execution, data theft, modification of system files, or denial of service, as reflected in the high impact metrics across all three security principles.
Advisories reference GitHub Gists at https://gist.github.com/joaoviictorti/abb2d1929c29d09c13c60bb45f28a8ff, which likely contain proof-of-concept details for the insecure file upload in givanz VvvebJs 1.7.2. Security practitioners should review these for reproduction steps and apply updates if available from the vendor or implement input validation and file type restrictions as mitigations.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insecure file upload in public-facing web application enables unauthenticated remote exploitation for initial access (T1190) and facilitates deployment of web shells for code execution and persistence (T1505.003).