YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 24 Jan 2026 02:00:00 +0900

Type Values Removed Values Added
Description YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
Title YetiShare File Hosting Script 5.1.0 Remote File Upload SSRF Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-23T21:47:48.936Z

Reserved: 2026-01-18T12:35:05.176Z

Link: CVE-2021-47899

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-23T17:16:02.120

Modified: 2026-01-23T17:16:02.120

Link: CVE-2021-47899

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses