Description
File Thingie 2.5.7 contains an authenticated file upload vulnerability that allows remote attackers to upload malicious PHP zip archives to the web server. Attackers can create a custom PHP payload, upload and unzip it, and then execute arbitrary system commands through a crafted PHP script with a command parameter.
Problem types
Unrestricted Upload of File with Dangerous Type
Product status
Credits
Maurice Fielenbach (grimlockx) - Hexastrike Cybersecurity UG (haftungsbeschränkt)
References
www.exploit-db.com/exploits/51436
www.exploit-db.com/exploits/51436 (ExploitDB-51436)
github.com/leefish/filethingie (Product GitHub Repository)
www.vulncheck.com/...trary-file-upload-remote-code-execution (VulnCheck Advisory: File Thingie 2.5.7 Authenticated Arbitrary File Upload Remote Code Execution)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.