YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
History

Fri, 23 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description YetiShare File Hosting Script 5.1.0 contains a server-side request forgery vulnerability that allows attackers to read local system files through the remote file upload feature. Attackers can exploit the url parameter in the url_upload_handler endpoint to access sensitive files like /etc/passwd by using file:/// protocol.
Title YetiShare File Hosting Script 5.1.0 Remote File Upload SSRF Vulnerability
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-01-23T16:47:42.136Z

Updated: 2026-01-23T16:47:42.136Z

Reserved: 2026-01-18T12:35:05.176Z

Link: CVE-2021-47899

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-23T17:16:02.120

Modified: 2026-01-23T17:16:02.120

Link: CVE-2021-47899

cve-icon Redhat

No data.