Cyber Posture

CVE-2024-27480

CriticalPublic PoC

Published: 29 December 2025

Published
29 December 2025
Modified
02 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 42.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-27480 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vvveb Vvvebjs. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the insecure file upload by enforcing validation of uploaded files to block dangerous types and content.

prevent

Restricts file uploads to only permitted types, preventing attackers from uploading malicious files without authentication.

prevent

Remediates the specific flaw in VvvebJs 1.7.2 by identifying, patching, and deploying fixes for the unrestricted upload vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Insecure file upload in public-facing web application enables unauthenticated remote exploitation for initial access (T1190) and facilitates deployment of web shells for code execution and persistence (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload.

Deeper analysisAI

CVE-2024-27480 affects givanz VvvebJs version 1.7.2, where an insecure file upload vulnerability exists. This flaw, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), allows attackers to upload files without sufficient validation. The vulnerability received a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.

Any remote attacker without authentication can exploit this vulnerability over the network with minimal effort. Successful exploitation enables the upload of malicious files, potentially leading to severe consequences such as remote code execution, data theft, modification of system files, or denial of service, as reflected in the high impact metrics across all three security principles.

Advisories reference GitHub Gists at https://gist.github.com/joaoviictorti/abb2d1929c29d09c13c60bb45f28a8ff, which likely contain proof-of-concept details for the insecure file upload in givanz VvvebJs 1.7.2. Security practitioners should review these for reproduction steps and apply updates if available from the vendor or implement input validation and file type restrictions as mitigations.

Details

CWE(s)

Affected Products

vvveb
vvvebjs
1.7.2

CVEs Like This One

CVE-2024-25182Same product: Vvveb Vvvebjs
CVE-2024-25181Same product: Vvveb Vvvebjs
CVE-2025-8323Shared CWE-434
CVE-2026-35047Shared CWE-434
CVE-2025-1128Shared CWE-434
CVE-2025-67910Shared CWE-434
CVE-2026-22799Shared CWE-434
CVE-2025-15226Shared CWE-434
CVE-2025-6440Shared CWE-434
CVE-2026-2097Shared CWE-434

References