CVE-2026-33221
LOWCVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N
Lifecycle Timeline
3Description
## Summary The storage service's file upload handler trusts the client-provided `Content-Type` header without performing server-side MIME type detection. This allows an attacker to upload files with an arbitrary MIME type, bypassing any MIME-type-based restrictions configured on storage buckets. ## Affected Component - **Service**: `services/storage` - **File**: `services/storage/controller/upload_files.go` - **Function**: `getMultipartFile` (lines 48-70) ## Root Cause In `getMultipartFile`, if the client provides a non-empty `Content-Type` header that isn't `application/octet-stream`, the function returns it as-is without performing content-based detection: ```go contentType := file.header.Header.Get("Content-Type") if contentType != "" && contentType != "application/octet-stream" { return fileContent, contentType, nil // skip detection entirely } // mimetype.DetectReader only reached if client sends no Content-Type // or sends application/octet-stream mt, err := mimetype.DetectReader(fileContent) ``` ## Impact **Incorrect MIME type in file metadata.** The MIME type stored in file metadata reflects what the client claims rather than what the file actually contains. Any system consuming this metadata (browsers, CDNs, applications) may handle the file incorrectly based on the spoofed type. ## Suggested Fix Always detect MIME type from file content using `mimetype.DetectReader`, ignoring the client-provided `Content-Type` header entirely. ## References - CWE-345: Insufficient Verification of Data Authenticity - CWE-434: Unrestricted Upload of File with Dangerous Type
Analysis
The Nhost storage service's file upload handler trusts the client-provided Content-Type header without performing server-side MIME type detection, allowing attackers to upload files with spoofed MIME types that bypass bucket-level MIME restrictions. This affects the Go module github.com/nhost/nhost and could cause downstream systems (browsers, CDNs, applications) to mishandle files based on false type metadata. …
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
During next maintenance window: Apply vendor patches when convenient. Vendor patch is available.
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-g9f6-9775-hffm