File restriction bypass in socket.io-file
High severity
GitHub Reviewed
Published
Oct 2, 2020
to the GitHub Advisory Database
•
Updated Jan 22, 2026
Description
Reviewed
Oct 2, 2020
Published to the GitHub Advisory Database
Oct 2, 2020
Last updated
Jan 22, 2026
All versions of
socket.io-fileare vulnerable to a file restriction bypass. The validation for valid file types only happens on the client-side, which allows an attacker to intercept the Websocket request post-validation and alter thenamevalue to upload any file types.No fix is currently available. Consider using an alternative package until a fix is made available.
References