Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

Critical AdonisJS Bodyparser Flaw (CVSS 9.2) Enables Arbitrary File Write on Servers

Posted on January 6, 2026January 6, 2026 By CWS

Jan 06, 2026Ravie LakshmananVulnerability / Internet Safety
Customers of the “@adonisjs/bodyparser” npm bundle are being suggested to replace to the newest model following the disclosure of a important safety vulnerability that, if efficiently exploited, may enable a distant attacker to put in writing arbitrary recordsdata on the server.
Tracked as CVE-2026-21440 (CVSS rating: 9.2), the flaw has been described as a path traversal situation affecting the AdonisJS multipart file dealing with mechanism. “@adonisjs/bodyparser” is an npm bundle related to AdonisJS, a Node.js framework for creating internet apps and API servers with TypeScript. The library is used to course of AdonisJS HTTP request physique.
“If a developer makes use of MultipartFile.transfer() with out the second choices argument or with out explicitly sanitizing the filename, an attacker can provide a crafted filename worth containing traversal sequences, writing to a vacation spot path outdoors the supposed add listing,” the mission maintainers mentioned in an advisory launched final week. “This could result in arbitrary file write on the server.”

Nevertheless, profitable exploitation hinges on a reachable add endpoint. The issue, at its core, resides in a operate named “MultipartFile.transfer(location, choices)” that enables a file to be moved to the desired location. The “choices” parameter holds two values: the identify of a file and an overwrite flag indicating “true” or “false.”
The problem arises when the identify parameter shouldn’t be handed as enter, inflicting the appliance to default to an unsanitized consumer filename that opens the door to path traversal. This, in flip, permits an attacker to decide on an arbitrary vacation spot of their liking and overwrite delicate recordsdata, if the overwrite flag is ready to “true.”
“If the attacker can overwrite utility code, startup scripts, or configuration recordsdata which might be later executed/loaded, RCE [remote code execution] is feasible,” AdonisJS mentioned. “RCE shouldn’t be assured and is dependent upon filesystem permissions, deployment structure, and utility/runtime conduct.”
The problem, found and reported by Hunter Wodzenski (@wodzen) impacts the next variations –

<= 10.1.1 (Mounted in 10.1.2)
<= 11.0.0-next.5 (Mounted in 11.0.0-next.6)

Flaw in jsPDF npm Library
The event coincides with the disclosure of one other path traversal vulnerability in an npm bundle named jsPDF (CVE-2025-68428, CVSS rating: 9.2) that might be exploited to move unsanitized paths and retrieve the contents of arbitrary recordsdata within the native file system the node course of is working.

The vulnerability has been patched in jsPDF model 4.0.0 launched on January 3, 2026. As workarounds, it is suggested to make use of the –permission flag to limit entry to the file system. A researcher named Kwangwoon Kim has been acknowledged for reporting the bug.
“The file contents are included verbatim within the generated PDFs,” Parallax, the builders of the JavaScript PDF technology library, mentioned. “Solely the node.js builds of the library are affected, particularly the dist/jspdf.node.js and dist/jspdf.node.min.js recordsdata.”

The Hacker News Tags:AdonisJS, Arbitrary, Bodyparser, Critical, CVSS, Enables, File, Flaw, Servers, Write

Post navigation

Previous Post: Russia-Aligned Hackers Abuse Viber to Target Ukrainian Military and Government
Next Post: GravityRAT with Remote Access Capabilities Attacking Windows, Android, and macOS Systems

Related Posts

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising The Hacker News
Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns Earth Ammit Breached Drone Supply Chains via ERP in VENOM, TIDRONE Campaigns The Hacker News
APT28’s Webhook Malware Targets Europe APT28’s Webhook Malware Targets Europe The Hacker News
OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans The Hacker News
6 Browser-Based Attacks Security Teams Need to Prepare For Right Now 6 Browser-Based Attacks Security Teams Need to Prepare For Right Now The Hacker News
Trojan VPNs Spread via SEO Poisoning, Microsoft Warns Trojan VPNs Spread via SEO Poisoning, Microsoft Warns The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark