-
CVSS Score
-A Semantic Attack on Google Gemini - Read the Latest Research
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| automad/automad | composer | <= 1.10.9 |
The vulnerability documentation explicitly identifies the import function in FileController.php as the entry point that mishandles the 'importUrl' parameter. The code example shows direct usage of Request::post('importUrl') without validation, and the exploit demonstrates how this parameter is injected to perform SSRF. While FileModel::import is mentioned as the destination for the tainted parameter, the primary validation failure occurs in the controller's handling of user input before delegation.