Description
A vulnerability was detected in kalyan02 NanoCMS up to 0.4. Affected by this issue is some unknown functionality of the file /data/pagesdata.txt of the component User Information Handler. Performing a manipulation results in direct request. It is possible to initiate the attack remotely. The exploit is now public and may be used. You should change the configuration settings.
Published: 2026-02-06
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

A vulnerability exists in the kalyan02 NanoCMS component that handles user information. The flaw resides in the /data/pagesdata.txt file, which can be accessed directly when a specific manipulation is performed. The result is a direct request to the file and the exposure of potentially sensitive user data. The attack can be initiated remotely, allowing an adversary to retrieve this information without authentication.

Affected Systems

kalyan02 NanoCMS versions up to and including 0.4 are affected. The vulnerability is tied to the User Information Handler attempting to read or expose the pagesdata.txt file. No later versions have been identified as unpatched for this issue.

Risk and Exploitability

The CVSS score of 6.9 denotes a moderate severity, with an EPSS of less than 1% indicating a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely by sending crafted HTTP requests to the NanoCMS instance. Since the exploit is publicly available and requires only a remote request, organizations running affected versions face a moderate risk that could lead to unauthorized disclosure of user information if the file is accessible over the network.

Generated by OpenCVE AI on April 18, 2026 at 13:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade NanoCMS to a version newer than 0.4 that addresses the direct request issue.
  • Modify the NanoCMS configuration to restrict or disable direct access to /data/pagesdata.txt, ensuring it is accessible only to authorized users.
  • Apply proper file permissions and access controls to the /data/pagesdata.txt file to prevent exposure to unauthenticated clients.

Generated by OpenCVE AI on April 18, 2026 at 13:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:kalyan02:nanocms:*:*:*:*:*:*:*:*

Fri, 06 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Kalyan02
Kalyan02 nanocms
Vendors & Products Kalyan02
Kalyan02 nanocms

Fri, 06 Feb 2026 04:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in kalyan02 NanoCMS up to 0.4. Affected by this issue is some unknown functionality of the file /data/pagesdata.txt of the component User Information Handler. Performing a manipulation results in direct request. It is possible to initiate the attack remotely. The exploit is now public and may be used. You should change the configuration settings.
Title kalyan02 NanoCMS User Information pagesdata.txt direct request
Weaknesses CWE-425
References
Metrics cvssV2_0

{'score': 5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:W/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:W/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Kalyan02 Nanocms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:20:50.974Z

Reserved: 2026-02-05T13:39:52.300Z

Link: CVE-2026-1978

cve-icon Vulnrichment

Updated: 2026-02-06T19:34:59.359Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-06T05:16:10.170

Modified: 2026-02-27T20:10:36.533

Link: CVE-2026-1978

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:45:45Z

Weaknesses