Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 06 Feb 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Sanluan PublicCMS up to 4.0.202506.d/5.202506.d/6.202506.d. Impacted is the function Paid of the file publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java of the component Trade Payment Handler. The manipulation of the argument paymentId leads to improper authorization. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 7329437e1288540336b1c66c114ed3363adcba02. It is recommended to apply a patch to fix this issue. | |
| Title | Sanluan PublicCMS Trade Payment TradePaymentService.java paid improper authorization | |
| Weaknesses | CWE-266 CWE-285 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-06T08:02:09.018Z
Reserved: 2026-02-05T19:24:59.797Z
Link: CVE-2026-2010
No data.
Status : Awaiting Analysis
Published: 2026-02-06T08:15:54.063
Modified: 2026-02-06T15:14:47.703
Link: CVE-2026-2010
No data.
OpenCVE Enrichment
No data.