CVE-2024-27480
Published: 29 December 2025
Summary
CVE-2024-27480 is a critical-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Vvveb Vvvebjs. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the insecure file upload by enforcing validation of uploaded files to block dangerous types and content.
Restricts file uploads to only permitted types, preventing attackers from uploading malicious files without authentication.
Remediates the specific flaw in VvvebJs 1.7.2 by identifying, patching, and deploying fixes for the unrestricted upload vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Insecure file upload in public-facing web application enables unauthenticated remote exploitation for initial access (T1190) and facilitates deployment of web shells for code execution and persistence (T1505.003).
NVD Description
givanz VvvebJs 1.7.2 is vulnerable to Insecure File Upload.
Deeper analysisAI
CVE-2024-27480 affects givanz VvvebJs version 1.7.2, where an insecure file upload vulnerability exists. This flaw, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type), allows attackers to upload files without sufficient validation. The vulnerability received a CVSS v3.1 base score of 9.8, indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and high impacts on confidentiality, integrity, and availability.
Any remote attacker without authentication can exploit this vulnerability over the network with minimal effort. Successful exploitation enables the upload of malicious files, potentially leading to severe consequences such as remote code execution, data theft, modification of system files, or denial of service, as reflected in the high impact metrics across all three security principles.
Advisories reference GitHub Gists at https://gist.github.com/joaoviictorti/abb2d1929c29d09c13c60bb45f28a8ff, which likely contain proof-of-concept details for the insecure file upload in givanz VvvebJs 1.7.2. Security practitioners should review these for reproduction steps and apply updates if available from the vendor or implement input validation and file type restrictions as mitigations.
Details
- CWE(s)