Description
A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-02-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Assess Impact
AI Analysis

Impact

A flaw in the SysFileController.upload method of huanzi‑qch base‑admin allows an attacker to upload any file because the implementation does not validate the File argument. The CVE description states that manipulating this argument can result in unrestricted upload, potentially allowing malicious files to be stored on the server.

Affected Systems

All builds of huanzi‑qch base‑admin that include the SysFileController component are potentially vulnerable. The project uses continuous delivery with rolling releases and no version information is available, so any deployment containing this component, regardless of its apparent revision, may be affected.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% indicates a low likelihood of exploitation at the present time. The vulnerability is not listed in CISA KEV. An attacker can trigger the flaw remotely using crafted HTTP requests to the upload endpoint, and the exploit code is publicly available.

Generated by OpenCVE AI on April 18, 2026 at 11:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or updated release that contains the fix as soon as it becomes available.
  • Implement server‑side validation to accept only the file types, extensions, and sizes that are explicitly allowed by the application.
  • Store uploaded files outside the web root or in a protected directory and restrict web access to that directory.
  • Monitor upload logs for anomalous activity and block known malicious IP addresses.

Generated by OpenCVE AI on April 18, 2026 at 11:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Huanzi-qch
Huanzi-qch base-admin
Vendors & Products Huanzi-qch
Huanzi-qch base-admin

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
Title huanzi-qch base-admin JSP Parser SysFileController.java upload unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Huanzi-qch Base-admin
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:19:40.333Z

Reserved: 2026-02-18T08:56:57.505Z

Link: CVE-2026-2665

cve-icon Vulnrichment

Updated: 2026-02-18T20:37:25.783Z

cve-icon NVD

Status : Deferred

Published: 2026-02-18T20:18:37.110

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses