Duplicate Advisory: "Arbitrary code execution in socket.io-file"
High severity
GitHub Reviewed
Published
May 10, 2021
to the GitHub Advisory Database
•
Updated Jan 22, 2026
Withdrawn
This advisory was withdrawn on Jan 22, 2026
Description
Published by the National Vulnerability Database
Oct 6, 2020
Reviewed
Apr 21, 2021
Published to the GitHub Advisory Database
May 10, 2021
Withdrawn
Jan 22, 2026
Last updated
Jan 22, 2026
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-6495-8jvh-f28x. This link is maintained to preserve external references.
Original Description
"The socket.io-file package through 2.0.31 for Node.js relies on client-side validation of file types, which allows remote attackers to execute arbitrary code by uploading an executable file via a modified JSON name field. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
References