{"id":"CVE-2025-27515","summary":"Laravel has a File Validation Bypass","details":"Laravel is a web application framework. When using wildcard validation to validate a given file or image field (`files.*`), a user-crafted malicious request could potentially bypass the validation rules. This vulnerability is fixed in 11.44.1 and 12.1.1.","aliases":["BIT-laravel-2025-27515","GHSA-78fx-h6xr-vch4"],"modified":"2026-05-18T05:58:05.214585931Z","published":"2025-03-05T18:45:50.101Z","database_specific":{"cwe_ids":["CWE-155"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/27xxx/CVE-2025-27515.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/27xxx/CVE-2025-27515.json"},{"type":"ADVISORY","url":"https://github.com/laravel/framework/security/advisories/GHSA-78fx-h6xr-vch4"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-27515"},{"type":"FIX","url":"https://github.com/laravel/framework/commit/2d133034fefddfb047838f4caca3687a3ba811a5"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/laravel/framework","events":[{"introduced":"bd8aeb64d3f9fa4b11690d702bdf289f5f32ae97"},{"fixed":"0883d4175f4e2b5c299e7087ad3c74f2ce195c6d"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-27515.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"}]}