๐Ÿ” CVE Alert

CVE-2026-34735

UNKNOWN 0.0

Hytale Modding Vulnerable to Remote Code Execution via File Upload Bypass in `FileController`

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

The Hytale Modding Wiki is a free service for Hytale mods to host their documentation & wikis. In version 1.2.0 and prior, the quickUpload() endpoint validates uploaded files by checking their MIME type (via PHP's finfo, which inspects file contents) but constructs the stored filename using the client-supplied file extension from getClientOriginalExtension(). These two checks are independent: an attacker can upload a file whose content passes the MIME allowlist while using a .php extension. The file is stored on the public disk and is directly accessible via URL, allowing server-side code execution. At time of publication no known patches exist.

CWE CWE-434
Vendor hytalemodding
Product wiki
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for hytalemodding wiki

Be the first to know when new unknown vulnerabilities affecting hytalemodding wiki are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

HytaleModding / wiki
<= 1.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/HytaleModding/wiki/security/advisories/GHSA-2xqq-6778-h4j9