{"uuid": "aba5b7a1-1cd7-41d5-bb8b-5ef8ee27a98a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-3518", "type": "seen", "source": "https://t.me/cvedetector/23488", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-3518 - Apache Stratos File Upload Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-3518 \nPublished : April 22, 2025, 9:15 a.m. | 40\u00a0minutes ago \nDescription : It technically possible for a user to upload a file to a conversation despite the file upload functionality being disabled.  \n  \nThe file upload functionality can be enabled or disabled for specific use cases through configuration. In case the functionality is disabled for at least one use case, the system nevertheless allows files to be uploaded through direct API requests. During the upload file, interception and allowed file type rules are still applied correctly.  \n  \nIf file sharing is generally enabled, this issue is not of concern. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T12:33:00.000000Z"}