First published: Tue Feb 04 2025(Updated: )
DumpDrop is a stupid simple file upload application that provides an interface for dragging and dropping files. An OS Command Injection vulnerability was discovered in the DumbDrop application, `/upload/init` endpoint. This vulnerability could allow an attacker to execute arbitrary code remotely when the **Apprise Notification** enabled. This issue has been addressed in commit `4ff8469d` and all users are advised to patch. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
DumpDrop |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24971 is classified as a critical severity OS Command Injection vulnerability.
To fix CVE-2025-24971, update to the latest version of the DumpDrop application that includes patches for this vulnerability.
CVE-2025-24971 exploits the `/upload/init` endpoint of the DumpDrop application, allowing arbitrary command execution.
Yes, CVE-2025-24971 can potentially allow attackers to access and manipulate sensitive data on the server.
All versions of DumpDrop prior to the security patch addressing CVE-2025-24971 are affected.