plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts. | |
| Title | Unsafe Client MIME Type Handling Can Enable Arbitrary File Upload in plank/laravel-mediable | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: TuranSec
Published:
Updated: 2026-03-26T11:03:27.086Z
Reserved: 2026-03-25T12:35:26.385Z
Link: CVE-2026-4809
No data.
Status : Received
Published: 2026-03-26T11:16:21.440
Modified: 2026-03-26T11:16:21.440
Link: CVE-2026-4809
No data.
OpenCVE Enrichment
No data.