Actions
Story #26
openEpic #25: Malicious File Upload Prevention
Validate File Extension Using Whitelist
Start date:
01/05/2026
Due date:
% Done:
0%
Estimated time:
Acceptance Criteria:
1. Only whitelisted file extensions are allowed
2. Executable extensions (.exe, .dll, .bat, .sh, etc.) are blocked
3. Validation enforced at server side
Same validation applied at frontend and API
4. Upload rejected with safe error message if extension is invalid
DOR:
No
Story Points:
Work Type:
Feature
User Impact:
Technical Area:
Release Narrative:
Planned Sprint:
Completed In Sprint:
Spillover Reason:
Deployment Reference URL:
Description
1. Application should check allowed File extension and File type (MIME Type- Multipurpose Internet Mail Extensions) in the upload module using white-list filter at server side.
2. Files with executable extensions like .exe, .dll, .bat, .sh, etc. are not allowed. Implemented in both Front end and API also.
Actions