{"id":"CVE-2021-45834","details":"An attacker can upload or transfer files of dangerous types to the OpenDocMan 1.4.4 portal via add.php using MIME-bypass, which may be automatically processed within the product's environment or lead to arbitrary code execution.","modified":"2026-04-12T03:55:51.693157Z","published":"2022-03-18T11:15:07.917Z","references":[{"type":"WEB","url":"http://opendocman.com"},{"type":"REPORT","url":"https://github.com/opendocman/opendocman/issues/326"},{"type":"REPORT","url":"https://github.com/opendocman/opendocman/issues/330"},{"type":"PACKAGE","url":"https://github.com/opendocman/opendocman"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/opendocman/opendocman","events":[{"introduced":"0"},{"last_affected":"b3f38dd67f119f855c1751224ec97e9caeeab701"}],"database_specific":{"cpe":"cpe:2.3:a:opendocman:opendocman:1.4.4:-:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"1.4.4-NA"}]}}],"versions":["1.2.6.1","1.2.6.2-release","1.2.6.2a","1.2.6.2b-release","1.2.6.3-release","1.2.6.3a","1.2.6.4-release","1.2.6.5-release","1.2.6.6-release","1.2.6.7-release","1.2.7.0","1.2.7.1","1.2.7.2","1.2.7.3","1.2.8","1.3.1","1.3.2","1.3.4","1.3.5-release","1.3.7-release","1.3.8-release","1.3.9-release","1.4.0-release","1.4.1-release","1.4.2-release","1.4.3-release","1.4.4-release","v1.2.6.8","v1.2.8.1","v1.2.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-45834.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}