As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used.
Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension.
The README has been updated to include these guidelines.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-20",
"CWE-434"
],
"github_reviewed_at": "2024-01-04T20:10:32Z",
"nvd_published_at": "2024-01-04T16:15:09Z",
"severity": "MODERATE"
}