| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.openmeetings:openmeetings-parent | maven | >= 1.0.0, < 3.3.0 |
| 3.3.0 |
The vulnerability stems from unconstrained file upload handling. While exact code isn't available, the description indicates missing upload validation. In Java web applications, file uploads are typically handled by servlet handlers or controller methods. The most likely vulnerable component would be the core file upload handler which lacked size restrictions and content validation in vulnerable versions. The confidence is high because: 1) The CWE-400 pattern matches unvalidated upload handlers 2) The vulnerability description explicitly mentions unchecked file uploads 3) The first patched version (3.3.0) likely added validation checks in this critical path.
KEV Misses 88% of Exploited CVEs- Get the report