Description
A flaw has been found in mingSoft MCMS 6.1.1. The affected element is an unknown function of the file /ms/file/uploadTemplate.do of the component Template Archive Handler. Executing a manipulation of the argument File can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.
Published: 2026-02-18
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Patch
AI Analysis

Impact

A bug in mingSoft MCMS 6.1.1 allows an attacker to manipulate the File argument of the /ms/file/uploadTemplate.do endpoint, leading to the ability to upload arbitrary files. The flaw stems from a missing validation routine, which permits any file type and size to be stored by the web application. If an uploaded file contains executable code or system configuration changes, this can result in remote code execution, defacement, or other compromise of confidentiality, integrity, or availability. The vulnerability is classified with CVSS 5.1, indicating a medium severity for the potential impact.

Affected Systems

The vulnerability affects the mingSoft MCMS product, specifically version 6.1.1. No other affected versions are listed in the data provided.

Risk and Exploitability

The vulnerability is exploitable from a remote host via the uploadTemplate.do URL. While the empirical EPSS score is less than 1%, an exploit has already been published and may be in use. The CVSS score of 5.1 reflects the moderate impact; however, the lack of public KEV listing and low EPSS suggest that exploitation is currently uncommon but possible for actors with sufficient motivation and access to the application.

Generated by OpenCVE AI on April 17, 2026 at 18:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MingSoft MCMS to the latest patched release or apply any vendor‑supplied patch that corrects the unrestricted upload issue.
  • Configure the uploadTemplate.do endpoint to accept only approved file types and enforce strict size limits, rejecting all other uploads.
  • Store uploaded files outside the web‑accessible directory or set the directory to non‑executable, and regularly audit for unauthorized uploads.

Generated by OpenCVE AI on April 17, 2026 at 18:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-r9wp-qq53-qvjx mingSoft MCMS does not properly restrict file uploads
History

Mon, 23 Feb 2026 10:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mingsoft:mcms:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 18:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mingsoft:mcms:6.1.1:*:*:*:*:*:*:*

Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Mingsoft
Mingsoft mcms
Vendors & Products Mingsoft
Mingsoft mcms

Wed, 18 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in mingSoft MCMS 6.1.1. The affected element is an unknown function of the file /ms/file/uploadTemplate.do of the component Template Archive Handler. Executing a manipulation of the argument File can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.
Title mingSoft MCMS Template Archive uploadTemplate.do unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 5.8, 'vector': 'AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.7, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:19:52.686Z

Reserved: 2026-02-18T09:01:48.810Z

Link: CVE-2026-2666

cve-icon Vulnrichment

Updated: 2026-02-18T20:35:28.313Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T20:18:37.297

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:45:25Z

Weaknesses