Description
ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.
Problem types
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE-73: External Control of File Name or Path
CWE-434: Unrestricted Upload of File with Dangerous Type
Product status
References
github.com/...nvertX/security/advisories/GHSA-cpww-gwgc-p72r
github.com/...nvertX/security/advisories/GHSA-cpww-gwgc-p72r
github.com/...ommit/550f472451755d095cf5802bc91f403e85b7129e
github.com/...cc14c5a16ecaaf2372b9ccbdf/src/pages/upload.tsx
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.