Home

Description

FileThingie 2.5.7 contains an arbitrary file upload vulnerability that allows attackers to upload malicious files by sending ZIP archives through the ft2.php endpoint. Attackers can upload ZIP files containing PHP shells, use the unzip functionality to extract them into accessible directories, and execute arbitrary commands through the extracted PHP files.

PUBLISHED Reserved 2026-02-22 | Published 2026-03-11 | Updated 2026-03-11 | Assigner VulnCheck




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

2.5.7
affected

Credits

Cakes finder

References

www.exploit-db.com/exploits/47349 (ExploitDB-47349) exploit

github.com/leefish/filethingie/archive/master.zip (Product Reference) product

www.vulncheck.com/...ingie-arbitrary-file-upload-via-ft2-php (VulnCheck Advisory: FileThingie 2.5.7 Arbitrary File Upload via ft2.php) third-party-advisory

cve.org (CVE-2019-25471)

nvd.nist.gov (CVE-2019-25471)

Download JSON