Bytedesk Vulnerabilities
Comprehensive security vulnerability database for Bytedesk products
2
0
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3749 | 5.3 | This vulnerability allows an attacker to upload any type of file to the Bytedesk application, which could lead to malicious files being executed on the server. It can be exploited remotely without needing special access, so it's crucial to upgrade to the latest version to fix this issue. | bytedeskbytedesk | Exploit Available | about 1 month agoMar 8, 2026 |
| CVE-2026-3748 | 5.3 | An attacker can exploit a flaw in Bytedesk to upload malicious files without restriction, which could lead to unauthorized access or control over the system. This vulnerability affects versions up to 1.3.9, and it is crucial to upgrade to version 1.4.5.1 to protect against potential attacks. | bytedeskbytedesk | Exploit Available | about 1 month agoMar 8, 2026 |
About Bytedesk Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Bytedesk products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.