Description
A flaw has been found in Blossom up to 1.17.1. This issue affects the function put of the file blossom-backend/common/common-iaas/src/main/java/com/blossom/common/iaas/blos/BLOSManager.java of the component File Upload. This manipulation causes path traversal. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal via File Upload
Action: Assess Impact
AI Analysis

Impact

A flaw exists in Blossom when the put method of BLOSManager.java processes uploaded files, allowing path traversal characters to be interpreted so that files can be written outside the intended upload directory. The vulnerability can be triggered by a remote actor through the public file‑upload interface, potentially enabling the placement of files in arbitrary locations on the server’s filesystem.

Affected Systems

Blossom applications with versions up to and including 1.17.1 are affected. The issue resides in the blossom‑backend component com.blossom.common.iaas. Users running the impacted binaries on any operating system must be aware that uploads may be stored outside the defined directory structure.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score of < 1 % suggests a very low likelihood of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires no prior authentication and can be carried out remotely by sending a crafted upload request containing traversal sequences. Defenders should treat this as a moderate‑risk issue but monitor for any vendor notice or exploit activity.

Generated by OpenCVE AI on April 18, 2026 at 12:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check the vendor’s website or community forum for an updated Blossom release that removes the path‑traversal flaw; if a patch is available, apply it immediately.
  • Configure the application to enforce strict directory constraints on the upload endpoint, stripping or rejecting any path segments that contain '..' or other traversal sequences before storing the file.
  • Ensure that the process running the Blossom backend runs with the minimal filesystem permissions necessary, limiting its ability to modify files outside the authorized directory tree.
  • Deploy a web‑application firewall or equivalent rule set that detects and blocks upload requests containing suspicious path traversal patterns.

Generated by OpenCVE AI on April 18, 2026 at 12:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Wangyunf
Wangyunf blossom
CPEs cpe:2.3:a:wangyunf:blossom:*:*:*:*:*:*:*:*
Vendors & Products Wangyunf
Wangyunf blossom

Wed, 18 Feb 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Blossom
Blossom blossom
Vendors & Products Blossom
Blossom blossom

Tue, 17 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
Description A flaw has been found in Blossom up to 1.17.1. This issue affects the function put of the file blossom-backend/common/common-iaas/src/main/java/com/blossom/common/iaas/blos/BLOSManager.java of the component File Upload. This manipulation causes path traversal. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Blossom File Upload BLOSManager.java put path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:15:57.295Z

Reserved: 2026-02-17T10:24:12.065Z

Link: CVE-2026-2623

cve-icon Vulnrichment

Updated: 2026-02-17T21:35:55.926Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-17T22:18:45.260

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2623

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:15:15Z

Weaknesses