Home

Description

ConvertXis a self-hosted online file converter. In versions prior to 0.16.0, the endpoint `/upload` allows an authenticated user to write arbitrary files on the system, overwriting binaries and allowing code execution. The upload function takes `file.name` directly from user supplied data without doing any sanitization on the name thus allowing for arbitrary file write. This can be used to overwrite system binaries with ones provided from an attacker allowing full code execution. Version 0.16.0 contains a patch for the issue.

PUBLISHED Reserved 2025-12-01 | Published 2025-12-16 | Updated 2025-12-16 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-73: External Control of File Name or Path

CWE-434: Unrestricted Upload of File with Dangerous Type

Product status

< 0.16.0
affected

References

github.com/...nvertX/security/advisories/GHSA-cpww-gwgc-p72r exploit

github.com/...nvertX/security/advisories/GHSA-cpww-gwgc-p72r

github.com/...ommit/550f472451755d095cf5802bc91f403e85b7129e

github.com/...cc14c5a16ecaaf2372b9ccbdf/src/pages/upload.tsx

cve.org (CVE-2025-66449)

nvd.nist.gov (CVE-2025-66449)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.