Description
A flaw has been found in xiweicheng TMS up to 2.28.0. This affects the function Summary of the file src/main/java/com/lhjz/portal/util/HtmlUtil.java. This manipulation of the argument url causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Published: 2026-01-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

A flaw in the Summary method of the HtmlUtil class permits manipulation of the URL argument, enabling a server‑side request forgery vulnerability. By supplying a crafted URL, an attacker can cause the application to send arbitrary requests from the server, potentially accessing internal resources or facilitating further compromise. The weakness is identified as CWE‑918, and the vendor has documented the issue for all releases up to version 2.28.0.

Affected Systems

xiweicheng Teamwork Management System (TMS) versions up to 2.28.0 are affected. The vulnerability originates in the src/main/java/com/lhjz/portal/util/HtmlUtil.java file. No specific sub‑components beyond the TMS platform are mentioned, and the impact applies to any deployment of the mentioned versions.

Risk and Exploitability

CVSS score 5.3 indicates a moderate severity. The EPSS score is below 1%, suggesting low current exploitation probability, but the exploit has been published and can be triggered remotely. The vulnerability is not listed in CISA’s KEV catalog. Attackers could leverage SSRF to reach internal services, exfiltrate data, or pivot to further attacks, especially if the application’s network is not adequately segmented.

Generated by OpenCVE AI on April 18, 2026 at 05:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade xiweicheng TMS to a version newer than 2.28.0.
  • Restrict the Summary function or block outbound HTTP requests from the application to only trusted hosts.
  • Apply network segmentation or firewall rules to prevent the server from reaching internal resources that should be inaccessible.
  • Monitor outbound traffic for suspicious requests and validate URL inputs to mitigate potential exploitation.

Generated by OpenCVE AI on April 18, 2026 at 05:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 08 Mar 2026 01:45:00 +0000

Type Values Removed Values Added
First Time appeared Xiweicheng teamwork Management System
CPEs cpe:2.3:a:xiweicheng:teamwork_management_system:*:*:*:*:*:*:*:*
Vendors & Products Xiweicheng teamwork Management System

Wed, 21 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Xiweicheng
Xiweicheng tms
Vendors & Products Xiweicheng
Xiweicheng tms

Sat, 17 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in xiweicheng TMS up to 2.28.0. This affects the function Summary of the file src/main/java/com/lhjz/portal/util/HtmlUtil.java. This manipulation of the argument url causes server-side request forgery. It is possible to initiate the attack remotely. The exploit has been published and may be used.
Title xiweicheng TMS HtmlUtil.java summary server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Xiweicheng Teamwork Management System Tms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:34:02.810Z

Reserved: 2026-01-16T19:09:14.916Z

Link: CVE-2026-1062

cve-icon Vulnrichment

Updated: 2026-01-21T16:30:21.431Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-17T20:15:53.740

Modified: 2026-03-08T01:31:35.060

Link: CVE-2026-1062

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:45:38Z

Weaknesses