CVE-2026-33221

LOW
2026-03-18 https://github.com/nhost/nhost GHSA-g9f6-9775-hffm

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
None

Lifecycle Timeline

3
Analysis Generated
Mar 18, 2026 - 20:30 vuln.today
Patch Released
Mar 18, 2026 - 20:30 nvd
Patch available
CVE Published
Mar 18, 2026 - 20:21 nvd
LOW

Description

## Summary The storage service's file upload handler trusts the client-provided `Content-Type` header without performing server-side MIME type detection. This allows an attacker to upload files with an arbitrary MIME type, bypassing any MIME-type-based restrictions configured on storage buckets. ## Affected Component - **Service**: `services/storage` - **File**: `services/storage/controller/upload_files.go` - **Function**: `getMultipartFile` (lines 48-70) ## Root Cause In `getMultipartFile`, if the client provides a non-empty `Content-Type` header that isn't `application/octet-stream`, the function returns it as-is without performing content-based detection: ```go contentType := file.header.Header.Get("Content-Type") if contentType != "" && contentType != "application/octet-stream" { return fileContent, contentType, nil // skip detection entirely } // mimetype.DetectReader only reached if client sends no Content-Type // or sends application/octet-stream mt, err := mimetype.DetectReader(fileContent) ``` ## Impact **Incorrect MIME type in file metadata.** The MIME type stored in file metadata reflects what the client claims rather than what the file actually contains. Any system consuming this metadata (browsers, CDNs, applications) may handle the file incorrectly based on the spoofed type. ## Suggested Fix Always detect MIME type from file content using `mimetype.DetectReader`, ignoring the client-provided `Content-Type` header entirely. ## References - CWE-345: Insufficient Verification of Data Authenticity - CWE-434: Unrestricted Upload of File with Dangerous Type

Analysis

The Nhost storage service's file upload handler trusts the client-provided Content-Type header without performing server-side MIME type detection, allowing attackers to upload files with spoofed MIME types that bypass bucket-level MIME restrictions. This affects the Go module github.com/nhost/nhost and could cause downstream systems (browsers, CDNs, applications) to mishandle files based on false type metadata. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

During next maintenance window: Apply vendor patches when convenient. Vendor patch is available.

Sign in for detailed remediation steps.

Priority Score

0
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +0
POC: 0

Share

CVE-2026-33221 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy