CVE-2026-38361
HIGH
7,5
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high
Description
AI Translation Available
An issue in fohrloop dash-uploader v.0.1.0 through v.0.7.0a2 allows a remote attacker to execute arbitrary code via the dash_uploader/httprequesthandler.py, dash_uploader/upload.py in the Upload function and max_file_size parameter, dash_uploader/configure_upload.py components
400
Uncontrolled Resource Consumption
DraftCommon Consequences
Security Scopes Affected:
Availability
Access Control
Other
Potential Impacts:
Dos: Crash, Exit, Or Restart
Dos: Resource Consumption (Cpu)
Dos: Resource Consumption (Memory)
Dos: Resource Consumption (Other)
Bypass Protection Mechanism
Other
Applicable Platforms
Technologies:
AI/ML, Not Technology-Specific
670
Always-Incorrect Control Flow Implementation
DraftCommon Consequences
Security Scopes Affected:
Other
Potential Impacts:
Other
Alter Execution Logic
Applicable Platforms
All platforms may be affected
https://github.com/a1ohadance/CVE-2026-38361
https://docs.python.org/3/library/functions.html#all
https://github.com/a1ohadance/CVE-2026-38361
https://github.com/fohrloop/dash-uploader
https://github.com/fohrloop/dash-uploader/blob/stable/dash_uploader/httprequest…
https://github.com/fohrloop/dash-uploader/issues/153
https://libraries.io/pypi/dash-uploader
https://pepy.tech/project/dash-uploader
https://pypi.org/project/dash-uploader/
https://pypistats.org/packages/dash-uploader