CVE-2026-38361 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: May 8, 2026
fohrloop dash-uploader - Remote Code Execution
Published: May 8, 2026Updated: May 8, 2026PoC AvailableRemote Exploitable
Overview
fohrloop dash-uploader v0.1.0 through v0.7.0a2 contains a remote code execution caused by improper handling in Upload function and max_file_size parameter in dash_uploader components, letting remote attackers execute arbitrary code, exploit requires crafted request.
Severity & Score
Severity: High
CVSS Score: 7.5
Impact
Remote attackers can execute arbitrary code, potentially leading to full system compromise.
Mitigation
Update to the latest version beyond v0.7.0a2.
References
- https://docs.python.org/3/library/functions.html#all
- https://github.com/a1ohadance/CVE-2026-38361
- https://github.com/fohrloop/dash-uploader/issues/153
- https://libraries.io/pypi/dash-uploader
- https://github.com/fohrloop/dash-uploader
- https://github.com/fohrloop/dash-uploader/blob/stable/dash_uploader/httprequesthandler.py
- https://pepy.tech/project/dash-uploader
- https://pypi.org/project/dash-uploader/
- https://pypistats.org/packages/dash-uploader
Related Resources
Details
- CVE ID
- CVE-2026-38361
- Severity
- High
- CVSS Score
- 7.5
- Type
- remote_code_execution
- Status
- unconfirmed
CWE
- CWE-400
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H