Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Hytale Modding Wiki is a free service for Hytale mods to host their documentation & wikis. In version 1.2.0 and prior, the quickUpload() endpoint validates uploaded files by checking their MIME type (via PHP's finfo, which inspects file contents) but constructs the stored filename using the client-supplied file extension from getClientOriginalExtension(). These two checks are independent: an attacker can upload a file whose content passes the MIME allowlist while using a .php extension. The file is stored on the public disk and is directly accessible via URL, allowing server-side code execution. At time of publication no known patches exist. | |
| Title | Hytale Modding Vulnerable to Remote Code Execution via File Upload Bypass in `FileController` | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T19:14:04.735Z
Reserved: 2026-03-30T18:41:20.754Z
Link: CVE-2026-34735
Updated: 2026-04-02T19:14:00.137Z
Status : Received
Published: 2026-04-02T19:21:32.723
Modified: 2026-04-02T19:21:32.723
Link: CVE-2026-34735
No data.
OpenCVE Enrichment
No data.