Loading
Arbitrary file upload vulnerability in com/dotmarketing/servlets/AjaxFileUploadServlet.class in dotCMS 4.1.1 allows remote authenticated administrators to upload .jsp files to arbitrary locations via directory traversal sequences in the fieldName parameter to servlets/ajax_file_upload. This results in arbitrary code execution by requesting the .jsp file at a /assets URI.
Use CWE-434, Dotcms vendor hub and Dotcms product page to widen CVE-2017-11466 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-26352, CVE-2025-11165 and CVE-2022-45782 for nearby disclosures in the same product family.