by-night sms V1.0 has an Arbitrary File Upload vulnerability. The /api/sms/upload/headImg endpoint allows uploading arbitrary files. Users can upload files of any size and type.
References
Link | Resource |
---|---|
https://github.com/by-night/sms/issues/50 | Exploit Issue Tracking Third Party Advisory |
https://github.com/echo0d/vulnerability/blob/main/by-night_sms/fileUpload.md | Exploit Third Party Advisory |
Configurations
History
17 Oct 2025, 14:30
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:by-night:sms:1.0:*:*:*:*:*:*:* | |
First Time |
By-night
By-night sms |
|
References | () https://github.com/by-night/sms/issues/50 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/echo0d/vulnerability/blob/main/by-night_sms/fileUpload.md - Exploit, Third Party Advisory |
17 Sep 2025, 14:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-434 |
16 Sep 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-09-16 20:15
Updated : 2025-10-17 14:30
NVD link : CVE-2025-56263
Mitre link : CVE-2025-56263
CVE.ORG link : CVE-2025-56263
JSON object : View
Products Affected
by-night
- sms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type