Description
A flaw has been found in bolo-blog bolo-solo up to 2.6.4. This affects the function importFromMarkdown of the file src/main/java/org/b3log/solo/bolo/prop/BackupService.java of the component Filename Handler. Executing a manipulation of the argument File can lead to path traversal. The attack may be performed from remote. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-03
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Directory Traversal
Action: Patch
AI Analysis

Impact

A flaw in the importFromMarkdown function of the BackupService allows an attacker to manipulate the File argument and perform a path traversal attack. This weakness can be used to read or write files outside the intended directory, potentially exposing sensitive data or overwriting critical files. The vulnerability is classified as CWE-22.

Affected Systems

The issue affects the bolo-blog bolo-solo project, specifically versions up to and including 2.6.4. The vulnerability resides in the Filename Handler component of the BackupService class.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity. The EPSS score is less than 1%, suggesting a low probability of exploitation at the time of analysis. The vulnerability is not listed in the CISA KEV catalog. Although the exploit has been published and can be performed from remote, the low EPSS score and lack of widespread public exploitation reduce the immediate risk compared to higher score vulnerabilities. It remains an actionable threat for organizations running affected versions.

Generated by OpenCVE AI on April 18, 2026 at 00:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade bolo-solo to a version newer than 2.6.4 where the importFromMarkdown function has been fixed.
  • If an upgrade is not immediately possible, remove or disable the importFromMarkdown API endpoint to eliminate the attack surface.
  • Implement file path validation checks that reject any relative path components or absolute paths before processing filenames.

Generated by OpenCVE AI on April 18, 2026 at 00:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Adlered
Adlered bolo-solo
CPEs cpe:2.3:a:adlered:bolo-solo:*:*:*:*:*:*:*:*
Vendors & Products Adlered
Adlered bolo-solo

Wed, 04 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Bolo-blog
Bolo-blog bolo-solo
Vendors & Products Bolo-blog
Bolo-blog bolo-solo

Tue, 03 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in bolo-blog bolo-solo up to 2.6.4. This affects the function importFromMarkdown of the file src/main/java/org/b3log/solo/bolo/prop/BackupService.java of the component Filename Handler. Executing a manipulation of the argument File can lead to path traversal. The attack may be performed from remote. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title bolo-blog bolo-solo Filename BackupService.java importFromMarkdown path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Adlered Bolo-solo
Bolo-blog Bolo-solo
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:15:44.878Z

Reserved: 2026-02-03T14:03:53.481Z

Link: CVE-2026-1811

cve-icon Vulnrichment

Updated: 2026-02-03T21:43:28.460Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-03T22:16:29.673

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1811

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:00:09Z

Weaknesses