目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-434 危险类型文件的不加限制上传 类漏洞列表 2034

CWE-434 危险类型文件的不加限制上传 类弱点 2034 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-434 属于不安全的文件上传漏洞,指系统允许上传并自动处理危险类型的文件。攻击者通常利用此缺陷上传恶意脚本或可执行文件,进而通过服务器自动执行功能获取系统控制权或植入后门。开发者应避免仅依赖文件扩展名验证,需结合内容检测、白名单机制及隔离存储策略,严格限制可上传的文件类型,从而有效阻断此类攻击路径。

MITRE CWE 官方描述
CWE:CWE-434 不受限制的危险类型文件上传 英文:该产品允许上传或传输危险的文件类型,这些文件会在其环境中被自动处理。
常见影响 (1)
Integrity, Confidentiality, AvailabilityExecute Unauthorized Code or Commands
Arbitrary code execution is possible if an uploaded file is interpreted and executed as code by the recipient. This is especially true for web-server extensions such as .asp and .php because these file types are often treated as automatically executable, even when file system permissions do not spec…
缓解措施 (5)
Architecture and DesignGenerate a new, unique filename for an uploaded file instead of using the user-supplied filename, so that no external input is used at all.[REF-422] [REF-423]
Architecture and DesignWhen the set of acceptable objects, such as filenames or URLs, is limited or known, create a mapping from a set of fixed input values (such as numeric IDs) to the actual filenames or URLs, and reject all other inputs.
Architecture and DesignConsider storing the uploaded files outside of the web document root entirely. Then, use other mechanisms to deliver the files dynamically. [REF-423]
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
Architecture and DesignDefine a very limited set of allowable extensions and only generate filenames that end in these extensions. Consider the possibility of XSS (CWE-79) before allowing .html or .htm file types.
代码示例 (2)
The following code intends to allow a user to upload a picture to the web server. The HTML code that drives the form on the user end has an input field of type "file".
<form action="upload_picture.php" method="post" enctype="multipart/form-data"> Choose a file to upload: <input type="file" name="filename"/> <br/> <input type="submit" name="submit" value="Submit"/> </form>
Good · HTML
// Define the target location where the picture being // uploaded is going to be saved. $target = "pictures/" . basename($_FILES['uploadedfile']['name']); // Move the uploaded file to the new location. if(move_uploaded_file($_FILES['uploadedfile']['tmp_name'], $target)) { echo "The picture has been successfully uploaded."; } else { echo "There was an error uploading the picture, please try again."; }
Bad · PHP
The following code demonstrates the unrestricted upload of a file with a Java servlet and a path traversal vulnerability. The action attribute of an HTML form is sending the upload file request to the Java servlet.
<form action="FileUploadServlet" method="post" enctype="multipart/form-data"> Choose a file to upload: <input type="file" name="filename"/> <br/> <input type="submit" name="submit" value="Submit"/> </form>
Good · HTML
public class FileUploadServlet extends HttpServlet { ... protected void doPost(HttpServletRequest request, HttpServletResponse response) throws ServletException, IOException { response.setContentType("text/html"); PrintWriter out = response.getWriter(); String contentType = request.getContentType(); // the starting position of the boundary header int ind = contentType.indexOf("boundary="); String boundary = contentType.substring(ind+9); String pLine = new String(); String uploadLocation = new String(UPLOAD_DIRECTORY_STRING); //Constant value // verify that content type is multipart form data i
Bad · Java
CVE ID标题CVSS风险等级Published
CVE-2025-14199 Verysync 代码问题漏洞 — 微力同步 6.3 Medium2025-12-07
CVE-2025-14195 Code-Projects Employee Profile Management System 代码问题漏洞 — Employee Profile Management System 6.3 Medium2025-12-07
CVE-2025-13065 WordPress plugin Starter Templates 代码问题漏洞 — Starter Templates – AI-Powered Templates for Elementor & Gutenberg 8.8 High2025-12-06
CVE-2025-12966 WordPress plugin All-in-One Video Gallery 代码问题漏洞 — All-in-One Video Gallery 8.8 High2025-12-06
CVE-2025-12673 WordPress plugin Flex QR Code Generator 代码问题漏洞 — Flex QR Code Generator 9.8 Critical2025-12-06
CVE-2020-36882 Flexsense DiskBoss 代码问题漏洞 — DiskBoss 7.5 -2025-12-05
CVE-2025-12154 WordPress plugin Auto Thumbnailer 代码问题漏洞 — Auto Thumbnailer 8.8 High2025-12-05
CVE-2025-12153 WordPress plugin Featured Image via URL 代码问题漏洞 — Featured Image via URL 8.8 High2025-12-05
CVE-2025-12181 WordPress plugin ContentStudio 代码问题漏洞 — ContentStudio 8.8 High2025-12-05
CVE-2025-13066 WordPress plugin Demo Importer Plus 代码问题漏洞 — Demo Importer Plus 8.8 High2025-12-05
CVE-2025-13543 WordPress plugin PostGallery 代码问题漏洞 — PostGallery 8.8 High2025-12-04
CVE-2025-13949 ProudMuBai GoFilm 代码问题漏洞 — GoFilm 6.3 Medium2025-12-03
CVE-2025-13646 WordPress plugin Modula Image Gallery 代码问题漏洞 — Image Gallery – Photo Grid & Video Gallery 7.5 High2025-12-03
CVE-2025-13827 Mautic 安全漏洞 — Mautic 9.8AICriticalAI2025-12-02
CVE-2025-13516 WordPress plugin SureMail 代码问题漏洞 — SureMail – SMTP and Email Logs Plugin with Amazon SES, Postmark, and Other Providers 8.1 High2025-12-02
CVE-2025-13815 Mogu blog 代码问题漏洞 — Mogu Blog v2 6.3 Medium2025-12-01
CVE-2025-13536 WordPress plugin Blubrry PowerPress 代码问题漏洞 — PowerPress Podcasting plugin by Blubrry 8.8 High2025-11-27
CVE-2025-66256 DB Electronica Mozart FM Transmitter 安全漏洞 — Mozart FM Transmitter 9.8AICriticalAI2025-11-26
CVE-2025-66250 DB Electronica Mozart FM Transmitter 安全漏洞 — Mozart FM Transmitter 9.8AICriticalAI2025-11-26
CVE-2025-13597 WordPress plugin AI Feeds 代码问题漏洞 — AI Feeds 9.8 Critical2025-11-25
CVE-2025-13595 WordPress plugin CIBELES AI 代码问题漏洞 — CIBELES AI 9.8 Critical2025-11-25
CVE-2025-13376 WordPress plugin ProjectList 代码问题漏洞 — ProjectList 7.2 High2025-11-25
CVE-2023-7330 Ruijie NBR Router 安全漏洞 — NBR Series Routers 9.8AICriticalAI2025-11-24
CVE-2025-13574 Code-Projects Online Bidding System 代码问题漏洞 — Online Bidding System 4.7 Medium2025-11-24
CVE-2025-13573 Projectworlds Advanced Library Management System 代码问题漏洞 — can pass malicious payloads 6.3 Medium2025-11-23
CVE-2025-13544 Travel Agency 代码问题漏洞 — travel-agency 6.3 Medium2025-11-23
CVE-2025-12973 WordPress plugin S2B AI Assistant 代码问题漏洞 — S2B AI Assistant – ChatBot, AI Agents, ChatGPT API, Image Generator 7.2 High2025-11-21
CVE-2025-13156 WordPress plugin Vitepos 代码问题漏洞 — Vitepos – Point of Sale (POS) for WooCommerce 8.8 High2025-11-21
CVE-2025-11456 WordPress plugin ELEX WordPress HelpDesk & Customer Ticketing System 代码问题漏洞 — ELEX WordPress HelpDesk & Customer Ticketing System 9.8 Critical2025-11-21
CVE-2025-12138 WordPress plugin URL Image Importer 代码问题漏洞 — URL Image Importer 8.8 High2025-11-21

CWE-434(危险类型文件的不加限制上传) 是常见的弱点类别,本平台收录该类弱点关联的 2034 条 CVE 漏洞。