Impact
The client-upload signed-URL endpoints for S3, GCS, Azure, and R2 did not properly sanitize filenames. An attacker could craft filenames to escape the intended storage location.
You are affected if ALL of these are true:
This vulnerability has been patched in v3.78.0. Filename validation has been hardened for client uploads.
Users should upgrade to v3.78.0 or later.
Workarounds
Until you can upgrade:
- Limit access to client-upload signed-URL endpoints to trusted users only.
Impact
The client-upload signed-URL endpoints for S3, GCS, Azure, and R2 did not properly sanitize filenames. An attacker could craft filenames to escape the intended storage location.
You are affected if ALL of these are true:
Payload version < v3.78.0
Using client-upload signed-URL endpoints for any supported storage adapter
Patches
This vulnerability has been patched in v3.78.0. Filename validation has been hardened for client uploads.
Users should upgrade to v3.78.0 or later.
Workarounds
Until you can upgrade: