Bytehoard is prone to directory traversal attacks. This could potentially permit remote attackers to gain unauthorized access to sensitive files hosted on the system running the software.
byteHoard contains a flaw that allows a remote attacker to access arbitrary files outside of the web path. The issue is due to the index.php not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "infolder" variable.
Upgrade to version 0.71 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.