-
CVSS Score
-The vulnerability stems from two key failures: 1) Inadequate file extension validation during upload (fixed in PR#534 by restricting to image extensions), and 2) Improper content handling when serving files (fixed in PR#535 by enforcing image MIME types). While exact function names aren't visible in diffs, the pattern of fixes (extension validation and MIME type enforcement) clearly indicates these two functional areas were vulnerable. The combination allowed HTML uploads and subsequent execution when accessed.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/gotify/server | go | <= 2.2.1 | 2.2.2 |
A Semantic Attack on Google Gemini - Read the Latest Research