Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3749: Unrestricted Upload in Bytedesk

0
Medium
VulnerabilityCVE-2026-3749cvecve-2026-3749
Published: Sun Mar 08 2026 (03/08/2026, 16:02:14 UTC)
Source: CVE Database V5
Product: Bytedesk

Description

A weakness has been identified in Bytedesk up to 1.3.9. This vulnerability affects the function handleFileUpload of the file source-code/src/main/java/com/bytedesk/core/upload/UploadRestService.java of the component SVG File Handler. Executing a manipulation can lead to unrestricted upload. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 1.4.5.1 is able to resolve this issue. This patch is called 975e39e4dd527596987559f56c5f9f973f64eff7. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 03/08/2026, 16:37:00 UTC

Technical Analysis

CVE-2026-3749 identifies a vulnerability in Bytedesk, a communication platform, specifically affecting versions 1.3.0 through 1.3.9. The flaw resides in the handleFileUpload function within the SVG File Handler component (source file: UploadRestService.java). This function fails to properly restrict file uploads, allowing an attacker to upload arbitrary files remotely without requiring user interaction or elevated privileges beyond low-level access. The vulnerability could be exploited to upload malicious files such as web shells, malware, or other payloads that could compromise the server or application environment. The exploit vector is network-based (AV:N), with low attack complexity (AC:L), no authentication required (AT:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is limited but present (VC:L, VI:L, VA:L), indicating potential for partial compromise or disruption. The vulnerability has been publicly disclosed and a proof-of-concept exploit is available, increasing the urgency for remediation. The vendor has addressed the issue in version 1.4.5.1, with a specific patch identified by commit 975e39e4dd527596987559f56c5f9f973f64eff7. Organizations using affected versions should upgrade promptly to prevent exploitation.

Potential Impact

The unrestricted file upload vulnerability allows attackers to place arbitrary files on the server hosting Bytedesk, which can lead to multiple attack scenarios including remote code execution, web shell deployment, or defacement. This can compromise the confidentiality of sensitive communications, integrity of data, and availability of the service. Since the exploit requires no user interaction and can be executed remotely, the attack surface is broad. Organizations relying on Bytedesk for internal or external communications may face data breaches, service disruptions, or lateral movement within their networks. The public availability of an exploit increases the likelihood of opportunistic attacks. The impact is particularly significant for organizations with sensitive data or regulatory compliance requirements. Failure to patch may result in reputational damage, financial loss, and operational downtime.

Mitigation Recommendations

1. Upgrade Bytedesk installations to version 1.4.5.1 or later immediately to apply the official patch that fixes the unrestricted upload vulnerability. 2. Implement strict file type validation and content inspection on all file uploads to prevent malicious files from being accepted. 3. Employ web application firewalls (WAFs) with rules to detect and block suspicious upload attempts targeting the SVG File Handler endpoint. 4. Restrict permissions of the upload directory to prevent execution of uploaded files, using OS-level controls and web server configurations. 5. Monitor logs for unusual upload activity or access patterns indicative of exploitation attempts. 6. Conduct regular security assessments and penetration testing focused on file upload functionalities. 7. Isolate Bytedesk servers within segmented network zones to limit lateral movement if compromise occurs. 8. Educate administrators and users about the risks of file upload vulnerabilities and the importance of timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-07T20:23:08.679Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ada2562904315ca3c51412

Added to database: 3/8/2026, 4:22:46 PM

Last enriched: 3/8/2026, 4:37:00 PM

Last updated: 3/12/2026, 10:27:59 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses