CVE-2026-30804
Published: 13 April 2026
Summary
CVE-2026-30804 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Artica Pandora Fms. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 48.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces validation of file upload inputs to reject dangerous types and malicious content, directly preventing exploitation of the unrestricted file upload vulnerability.
Requires timely remediation of known flaws like CVE-2026-30804 through patching Pandora FMS versions 777-800 to eliminate the vulnerability.
Deploys malicious code detection and prevention mechanisms to scan and block execution of dangerous files uploaded via the vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload (CWE-434) in public-facing Pandora FMS web app directly enables initial access via T1190 and deployment of a web shell (T1505.003) for RCE.
NVD Description
Unrestricted Upload of File with Dangerous Type vulnerability allows Remote Code Execution via file upload. This issue affects Pandora FMS: from 777 through 800
Deeper analysisAI
CVE-2026-30804 is an Unrestricted Upload of File with Dangerous Type vulnerability (CWE-434) that enables remote code execution through file uploads. It affects Pandora FMS versions from 777 through 800. The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact on confidentiality, integrity, and availability.
A remote attacker with high privileges can exploit this vulnerability over the network with low attack complexity and no user interaction required. Successful exploitation allows the attacker to upload malicious files, leading to arbitrary remote code execution on the affected system.
For mitigation details, refer to the official advisory at https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/.
Details
- CWE(s)