WhisperX tag archive

#file-upload

This page collects WhisperX intelligence signals tagged #file-upload. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-03 21:27:09 · GitHub Issues

1. FinSpark API Exposed: Path Traversal Flaw Lets Attackers Write to Server Filesystem

A critical path traversal vulnerability in the FinSpark API allows attackers to write arbitrary files anywhere on the server filesystem. The flaw is in the document upload endpoint, where the system blindly trusts the `file.filename` provided by the client. By submitting a filename like `../../etc/cron.d/backdoor`, an ...

The Lab · 2026-04-22 05:22:36 · GitHub Issues

2. AdonisJS UploadedFile.store() Exposes Critical Security Gap: No Extension or MIME Validation

A critical security vulnerability has been identified in the AdonisJS framework's core file upload handler. The `UploadedFile.store()` method, responsible for saving user-uploaded files to disk, lacks fundamental validation checks, creating a direct path for attackers to upload and execute malicious code on a server. W...

The Lab · 2026-04-26 04:54:07 · GitHub Issues

3. Critical CWE-22 Path Traversal Vulnerability Patched in File Upload Route

A critical path traversal vulnerability has been remediated in the file upload endpoint at `packages/lib/services/rest/routes/resources.ts`. The flaw, designated CWE-22, enabled attackers to access or modify arbitrary filesystem locations on the server by exploiting insufficient input validation on file paths during mu...