As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used.
Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension.
The README has been updated to include these guidelines.
{ "nvd_published_at": "2024-01-04T16:15:09Z", "cwe_ids": [ "CWE-20", "CWE-434" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-01-04T20:10:32Z" }