CVE-2026-33653: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in farisc0de Uploady
CVE-2026-33653 is a stored Cross-Site Scripting (XSS) vulnerability affecting farisc0de's Uploady file uploader script versions prior to 3. 1. 2. The vulnerability arises from improper sanitization of filenames during file uploads, allowing attackers to embed malicious JavaScript code in filenames. When these filenames are displayed in the application, the script executes in the browsers of users viewing the file list or details, potentially leading to session hijacking or other client-side attacks. Exploitation requires an attacker with at least limited privileges to upload files and some user interaction to view the malicious filename. The vulnerability has a CVSS score of 4. 6 (medium severity) and does not appear to have known exploits in the wild. Upgrading to version 3. 1.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-33653 affects farisc0de's Uploady, a multi-file upload script widely used for managing file uploads in web applications. The core issue is a stored Cross-Site Scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, Uploady versions prior to 3.1.2 fail to sanitize filenames uploaded by users, allowing an attacker to craft filenames containing malicious JavaScript code. When these filenames are later rendered in the file list or file details pages without proper escaping or encoding, the embedded script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or execution of arbitrary client-side code. The attack vector requires the attacker to have at least limited privileges to upload files and relies on user interaction to trigger the payload. The vulnerability has a CVSS v3.1 base score of 4.6, reflecting its medium severity, with an attack vector of network, low attack complexity, and requiring privileges and user interaction. No known exploits have been reported in the wild as of the publication date. The vendor addressed the vulnerability in version 3.1.2 by implementing proper escaping of filenames before rendering them in the UI, effectively mitigating the risk. This vulnerability highlights the importance of rigorous input validation and output encoding in web applications, especially those handling user-generated content such as file uploads.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the browsers of users who view maliciously named files within the Uploady interface. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the user, or delivery of further malware. While the vulnerability does not directly compromise server confidentiality or availability, the client-side impact can be significant, especially in environments where sensitive data or privileged user sessions are involved. Organizations using Uploady in internal or customer-facing portals risk exposing their users to phishing, social engineering, or persistent client-side attacks. The requirement for an attacker to have upload privileges limits the attack surface but does not eliminate risk, as many applications allow authenticated users or even guests to upload files. The medium CVSS score reflects moderate risk, but the potential for chained attacks or exploitation in high-value environments could increase the overall impact. Failure to patch could also damage organizational reputation and user trust if exploited.
Mitigation Recommendations
Organizations should immediately upgrade Uploady to version 3.1.2 or later to apply the official fix that properly escapes filenames before rendering. Beyond patching, implement strict input validation on filenames to reject or sanitize suspicious characters such as angle brackets, quotes, and script tags. Employ output encoding techniques (e.g., HTML entity encoding) whenever displaying user-supplied data in web pages to prevent script execution. Restrict file upload permissions to trusted users only and monitor upload activity for anomalous behavior. Consider implementing Content Security Policy (CSP) headers to limit the impact of any injected scripts. Regularly audit and test web applications for XSS vulnerabilities, including stored XSS in file upload components. Educate developers on secure coding practices related to input handling and output encoding. Finally, maintain comprehensive logging and alerting to detect potential exploitation attempts promptly.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Japan, Netherlands, Brazil
CVE-2026-33653: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in farisc0de Uploady
Description
CVE-2026-33653 is a stored Cross-Site Scripting (XSS) vulnerability affecting farisc0de's Uploady file uploader script versions prior to 3. 1. 2. The vulnerability arises from improper sanitization of filenames during file uploads, allowing attackers to embed malicious JavaScript code in filenames. When these filenames are displayed in the application, the script executes in the browsers of users viewing the file list or details, potentially leading to session hijacking or other client-side attacks. Exploitation requires an attacker with at least limited privileges to upload files and some user interaction to view the malicious filename. The vulnerability has a CVSS score of 4. 6 (medium severity) and does not appear to have known exploits in the wild. Upgrading to version 3. 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-33653 affects farisc0de's Uploady, a multi-file upload script widely used for managing file uploads in web applications. The core issue is a stored Cross-Site Scripting (XSS) flaw categorized under CWE-79, caused by improper neutralization of input during web page generation. Specifically, Uploady versions prior to 3.1.2 fail to sanitize filenames uploaded by users, allowing an attacker to craft filenames containing malicious JavaScript code. When these filenames are later rendered in the file list or file details pages without proper escaping or encoding, the embedded script executes in the context of the victim's browser. This can lead to theft of session cookies, defacement, or execution of arbitrary client-side code. The attack vector requires the attacker to have at least limited privileges to upload files and relies on user interaction to trigger the payload. The vulnerability has a CVSS v3.1 base score of 4.6, reflecting its medium severity, with an attack vector of network, low attack complexity, and requiring privileges and user interaction. No known exploits have been reported in the wild as of the publication date. The vendor addressed the vulnerability in version 3.1.2 by implementing proper escaping of filenames before rendering them in the UI, effectively mitigating the risk. This vulnerability highlights the importance of rigorous input validation and output encoding in web applications, especially those handling user-generated content such as file uploads.
Potential Impact
The primary impact of this vulnerability is the potential for attackers to execute arbitrary JavaScript in the browsers of users who view maliciously named files within the Uploady interface. This can lead to session hijacking, credential theft, unauthorized actions performed on behalf of the user, or delivery of further malware. While the vulnerability does not directly compromise server confidentiality or availability, the client-side impact can be significant, especially in environments where sensitive data or privileged user sessions are involved. Organizations using Uploady in internal or customer-facing portals risk exposing their users to phishing, social engineering, or persistent client-side attacks. The requirement for an attacker to have upload privileges limits the attack surface but does not eliminate risk, as many applications allow authenticated users or even guests to upload files. The medium CVSS score reflects moderate risk, but the potential for chained attacks or exploitation in high-value environments could increase the overall impact. Failure to patch could also damage organizational reputation and user trust if exploited.
Mitigation Recommendations
Organizations should immediately upgrade Uploady to version 3.1.2 or later to apply the official fix that properly escapes filenames before rendering. Beyond patching, implement strict input validation on filenames to reject or sanitize suspicious characters such as angle brackets, quotes, and script tags. Employ output encoding techniques (e.g., HTML entity encoding) whenever displaying user-supplied data in web pages to prevent script execution. Restrict file upload permissions to trusted users only and monitor upload activity for anomalous behavior. Consider implementing Content Security Policy (CSP) headers to limit the impact of any injected scripts. Regularly audit and test web applications for XSS vulnerabilities, including stored XSS in file upload components. Educate developers on secure coding practices related to input handling and output encoding. Finally, maintain comprehensive logging and alerting to detect potential exploitation attempts promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T15:23:42.218Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c5a54b3c064ed76fcfc81c
Added to database: 3/26/2026, 9:29:47 PM
Last enriched: 3/26/2026, 9:47:51 PM
Last updated: 3/27/2026, 5:26:12 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.