Description
Airleader Master versions 6.381 and prior allow for file uploads without
restriction to multiple webpages running maximum privileges. This could
allow an unauthenticated user to potentially obtain remote code
execution on the server.
Published: 2026-02-12
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Airleader Master versions 6.381 and earlier allow users to upload arbitrary files with no restriction on content type to multiple web pages that run at maximum privileges. The lack of validation for the file type and the execution context permits an unauthenticated attacker to deliver a script or binary that is executed on the server, leading to full compromise of confidentiality, integrity and availability. The weakness is classified as CWE-434, an unsafe file upload flaw.

Affected Systems

Airleader GmbH’s Airleader Master application, versions up to and including 6.381, are affected. The fixed version begins with 6.386; all earlier releases carry the vulnerability and should be updated as soon as possible.

Risk and Exploitability

The CVSS base score of 9.3 indicates a critical level of risk. EPSS is reported as less than 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is an unauthenticated user uploading a malicious file through one of the publicly accessible upload endpoints; the server then executes the uploaded file with full privileges, providing the attacker control over the system. While the probability of exploitation is low at present, the high potential impact warrants prompt mitigation.

Generated by OpenCVE AI on April 16, 2026 at 17:11 UTC.

Remediation

Vendor Solution

Airleader recommends that users upgrade Airleader Master to version 6.386 or later. Users of Airleader Master are encouraged to reach out to Airleader via email (info@airleader.us) or submit a web form ( https://airleader.us/contact/ ) for more information and mitigation assistance.


OpenCVE Recommended Actions

  • Upgrade Airleader Master to version 6.386 or later as recommended by the vendor.
  • If an upgrade cannot be performed immediately, immediately disable or restrict file upload functionality on all web pages that run with elevated privileges, allowing only safe file types and enforcing strict size limits.
  • Implement monitoring of upload activity and server logs for anomalous file transfer attempts, and apply contextual input validation to prevent execution of uploaded content.

Generated by OpenCVE AI on April 16, 2026 at 17:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Tue, 17 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Airleader
Airleader airleader Master
Vendors & Products Airleader
Airleader airleader Master

Fri, 13 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description Airleader Master versions 6.381 and prior allow for file uploads without restriction to multiple webpages running maximum privileges. This could allow an unauthenticated user to potentially obtain remote code execution on the server.
Title Airleader Master Unrestricted Upload of File with Dangerous Type
Weaknesses CWE-434
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Airleader Airleader Master
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-03-03T20:23:34.197Z

Reserved: 2026-01-22T20:21:20.996Z

Link: CVE-2026-1358

cve-icon Vulnrichment

Updated: 2026-02-13T16:27:27.200Z

cve-icon NVD

Status : Deferred

Published: 2026-02-12T22:16:04.213

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1358

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T17:15:17Z

Weaknesses