Plenti <= 0.7.16 is vulnerable to code execution. Users uploading '.svelte' files with the /postLocal endpoint can define the file name as javascript codes. The server executes the uploaded file name in host, and cause code execution.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-26260.json"