← Back to CVEs
CVE-2026-2665
MEDIUM6.3
Description
A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
CVE Details
CVSS v3.1 Score6.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/18/2026
Last Modified2/19/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-284CWE-434
References
https://github.com/huanzi-qch/base-admin/(cna@vuldb.com)
https://github.com/huanzi-qch/base-admin/issues/38(cna@vuldb.com)
https://vuldb.com/?ctiid.346462(cna@vuldb.com)
https://vuldb.com/?id.346462(cna@vuldb.com)
https://vuldb.com/?submit.753240(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.