A file upload bypass vulnerability exists in Laravel Sharp versions prior to 9.20.0. Authenticated users can exploit this to bypass file type restrictions, potentially leading to arbitrary code execution if a public disk is used. Update to version 9.20.0 to address this issue.
With a CVSS score of 8.8, this is a high-severity vulnerability due to potential for code execution.
What is Laravel?
CVE-2026-33687: File Upload Restriction Bypass
High severity due to potential for arbitrary code execution.
With an EPSS score of 0.049, the probability of exploitation is relatively low.
The `ApiFormUploadController` in Sharp allows authenticated users to control the `validation_rule` parameter. By manipulating this parameter, attackers can bypass file type and extension restrictions, potentially uploading malicious files.
How to fix CVE-2026-33687 in Laravel Sharp
Patch immediately- 1.Update your Laravel Sharp installation to version 9.20.0 or later.
composer update laravelWorkaround: Ensure that the storage disk used for Sharp uploads is strictly private. Under default configurations, an attacker cannot directly execute uploaded PHP files unless a public disk configuration is explicitly used.
NextGuard automatically flags CVE-2026-33687 if laravel appears in any of your monitored projects — no manual lookup required.
Stay ahead of laravel vulnerabilities
Proactively manage your application security by tracking and mitigating laravel vulnerabilities. Use NextGuard to monitor your laravel dependencies.
Compare PlansFrequently asked questions
The file upload bypass vulnerability in Laravel Sharp can be mitigated by updating to version 9.20.0. Regularly updating your dependencies is crucial for maintaining application security. see all laravel vulnerabilities.
Related topics