-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/answerdev/answer | go | < 1.0.8 | 1.0.8 |
The vulnerability stems from unprocessed EXIF data in user-uploaded images. The commit adds EXIF removal via a new Dexif function call within uploadFile(). In vulnerable versions (<1.0.8), this sanitization step was missing. The uploadFile function is directly responsible for processing uploads and writing files to storage, making it the vulnerable entry point. The patch confirms this by adding EXIF removal at this exact location in the file processing workflow.
A Semantic Attack on Google Gemini - Read the Latest Research