The Multiple File Upload add-on component 3.1.0 for OutSystems is vulnerable to Unrestricted File Upload. This occurs because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify a parameter to bypass extension restrictions and upload arbitrary files. NOTE: this is a third-party component that is not supplied or supported by OutSystems.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-13374 Outsystems Multiple File Upload < 3.1.0 is vulnerable to Unrestricted File Upload. The vulnerability is because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify the parameter to bypass extension restrictions and upload arbitrary files.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Oct 2025 02:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-434

Wed, 27 Aug 2025 05:30:00 +0900

Type Values Removed Values Added
Weaknesses CWE-434

Sat, 12 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00081}

epss

{'score': 0.00082}


Tue, 17 Jun 2025 23:30:00 +0900

Type Values Removed Values Added
First Time appeared Multiple File Upload Project
Multiple File Upload Project multiple File Upload
CPEs cpe:2.3:a:multiple_file_upload_project:multiple_file_upload:3.1.0:*:*:*:*:outsystems:*:*
Vendors & Products Multiple File Upload Project
Multiple File Upload Project multiple File Upload

Fri, 09 May 2025 03:00:00 +0900

Type Values Removed Values Added
Weaknesses CWE-602
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Fri, 09 May 2025 02:45:00 +0900

Type Values Removed Values Added
Description Outsystems Multiple File Upload < 3.1.0 is vulnerable to Unrestricted File Upload. The vulnerability is because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify the parameter to bypass extension restrictions and upload arbitrary files. The Multiple File Upload add-on component 3.1.0 for OutSystems is vulnerable to Unrestricted File Upload. This occurs because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify a parameter to bypass extension restrictions and upload arbitrary files. NOTE: this is a third-party component that is not supplied or supported by OutSystems.

Thu, 08 May 2025 04:15:00 +0900

Type Values Removed Values Added
Weaknesses CWE-434
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 05 May 2025 22:45:00 +0900

Type Values Removed Values Added
Description Outsystems Multiple File Upload < 3.1.0 is vulnerable to Unrestricted File Upload. The vulnerability is because file extension and size validations are enforced solely on the client side. An attacker can intercept the upload request and modify the parameter to bypass extension restrictions and upload arbitrary files.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-08-26T19:27:57.951Z

Reserved: 2025-03-11T00:00:00.000Z

Link: CVE-2025-28168

cve-icon Vulnrichment

Updated: 2025-05-05T17:44:24.382Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-05T14:15:28.500

Modified: 2025-09-30T17:01:40.920

Link: CVE-2025-28168

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses