CVE-2024-49380

Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:*

History

06 May 2025, 17:53

Type Values Removed Values Added
References () https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 - () https://github.com/plentico/plenti/blob/01825e0dcd3505fac57adc2edf29f772d585c008/cmd/serve.go#L205 - Product
References () https://github.com/plentico/plenti/releases/tag/v0.7.2 - () https://github.com/plentico/plenti/releases/tag/v0.7.2 - Release Notes
References () https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ - () https://securitylab.github.com/advisories/GHSL-2024-297_GHSL-2024-298_plenti/ - Third Party Advisory, Exploit
First Time Plenti
Plenti plenti
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:plenti:plenti:*:*:*:*:*:*:*:*

Information

Published : 2024-10-25 14:15

Updated : 2025-05-06 17:53


NVD link : CVE-2024-49380

Mitre link : CVE-2024-49380

CVE.ORG link : CVE-2024-49380


JSON object : View

Products Affected

plenti

  • plenti
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')