Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4809: CWE-434 Unrestricted Upload of File with Dangerous Type in plank laravel-mediable

0
Critical
VulnerabilityCVE-2026-4809cvecve-2026-4809cwe-434
Published: Thu Mar 26 2026 (03/26/2026, 11:03:27 UTC)
Source: CVE Database V5
Vendor/Project: plank
Product: laravel-mediable

Description

plank/laravel-mediable through version 6.4.0 can allow upload of a dangerous file type when an application using the package accepts or prefers a client-supplied MIME type during file upload handling. In that configuration, a remote attacker can submit a file containing executable PHP code while declaring a benign image MIME type, resulting in arbitrary file upload. If the uploaded file is stored in a web-accessible and executable location, this may lead to remote code execution. At the time of publication, no patch was available and the vendor had not responded to coordinated disclosure attempts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 18:32:30 UTC

Technical Analysis

CVE-2026-4809 is a severe security vulnerability identified in the plank/laravel-mediable package, a popular Laravel PHP package used for handling media uploads. The vulnerability stems from improper validation of MIME types during file uploads when the application is configured to accept or prioritize client-supplied MIME types. An attacker can exploit this by uploading a file containing malicious PHP code while declaring a benign MIME type such as an image format. Because the package does not sufficiently verify the true nature of the file content, the malicious file can be accepted and stored. If the uploaded file is placed in a directory accessible and executable by the web server, this leads to arbitrary remote code execution (RCE) on the hosting server. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. At the time of publication, no patch or vendor response was available, increasing the urgency for users to apply mitigations. The CVSS 4.0 score of 9.3 (AV:N/AC:L/PR:N/UI:N/VC:H/VI:H/VA:H) indicates network exploitable, no privileges or user interaction required, with high impact on confidentiality, integrity, and availability. This vulnerability is categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type), a common vector for web application compromise. Given the widespread use of Laravel and the plank/laravel-mediable package in web applications, this vulnerability poses a critical threat to affected systems.

Potential Impact

The impact of CVE-2026-4809 is severe for organizations using the plank/laravel-mediable package in their Laravel-based web applications. Successful exploitation allows attackers to upload and execute arbitrary PHP code remotely, leading to full system compromise. This can result in data breaches, unauthorized access, defacement, malware deployment, and lateral movement within the network. Because the vulnerability requires no authentication or user interaction, attackers can automate exploitation at scale. The ability to execute code on the server undermines confidentiality, integrity, and availability of affected systems. Organizations may face operational disruption, reputational damage, regulatory penalties, and financial losses. The lack of an available patch at disclosure increases the window of exposure, making timely mitigation critical. Web servers hosting vulnerable applications are prime targets for attackers seeking footholds in corporate or cloud environments.

Mitigation Recommendations

1. Immediately disable any application logic or configuration that accepts or prefers client-supplied MIME types during file uploads. Enforce server-side MIME type validation using reliable methods such as file content inspection (e.g., PHP's finfo_file) rather than trusting client headers. 2. Restrict uploaded files to non-executable directories outside the web root or configure web server settings (e.g., .htaccess, nginx config) to prevent execution of uploaded files. 3. Implement strict allowlists for permitted file extensions and MIME types, and reject all others. 4. Monitor upload endpoints for anomalous activity and implement rate limiting to reduce automated exploitation attempts. 5. Apply web application firewalls (WAF) with rules targeting file upload abuse and PHP code injection patterns. 6. Regularly audit and update dependencies; monitor for vendor patches or advisories from plank/laravel-mediable. 7. Consider additional runtime protections such as PHP disable_functions for critical functions and containerization to limit impact. 8. Educate development teams on secure file upload handling best practices to prevent similar issues in future.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TuranSec
Date Reserved
2026-03-25T12:35:26.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c57a7f3c064ed76f9f9d50

Added to database: 3/26/2026, 6:27:11 PM

Last enriched: 3/26/2026, 6:32:30 PM

Last updated: 3/26/2026, 9:59:55 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses