Description
A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The affected element is an unknown function of the file /Using/Subject/downLoad.html. Performing a manipulation of the argument path results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-18
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure (Remote File Read)
Action: Patch
AI Analysis

Impact

A path traversal flaw exists in the /Using/Subject/downLoad.html component of Tsinghua Unigroup Electronic Archives System version 3.2.210802(62532). Manipulating the path argument allows an attacker to access files outside the intended directory, potentially exposing sensitive data. The vulnerability is a traditional relative path traversal (CWE‑22) and can be used to read arbitrary files on the web server. The information disclosed could compromise confidential documents and potentially expose system configuration or credential information.

Affected Systems

The vulnerability affects the Tsinghua Unigroup Electronic Archives System, specifically the download functionality exposed through /Using/Subject/downLoad.html. The affected version is 3.2.210802(62532). No other editions or patch releases are listed as affected.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate risk, while the EPSS score of less than 1% suggests low exploitation likelihood at the moment. The vulnerability can be triggered remotely over the network by supplying a crafted path parameter, and the exploit code has been made publicly available. The system is not listed in KEV, so no confirmed exploit activity is recorded yet, but the public availability of the exploit raises the threat level for environments that have not yet applied a fix.

Generated by OpenCVE AI on April 18, 2026 at 11:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor’s official patch or upgrade to a non‑affected version as soon as it becomes available.
  • Limit exposure of the download endpoint by configuring the web server to restrict access to authorized users or IP ranges.
  • Implement server‑side validation to reject or normalize any path traversal sequences (e.g., '../') supplied in the path parameter.

Generated by OpenCVE AI on April 18, 2026 at 11:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 03 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Unigroup
Unigroup electronic Archives System
CPEs cpe:2.3:a:unigroup:electronic_archives_system:*:*:*:*:*:*:*:*
Vendors & Products Unigroup
Unigroup electronic Archives System

Thu, 19 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Tsinghua Unigroup
Tsinghua Unigroup electronic Archives System
Vendors & Products Tsinghua Unigroup
Tsinghua Unigroup electronic Archives System

Wed, 18 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). The affected element is an unknown function of the file /Using/Subject/downLoad.html. Performing a manipulation of the argument path results in path traversal. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Tsinghua Unigroup Electronic Archives System downLoad.html path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Tsinghua Unigroup Electronic Archives System
Unigroup Electronic Archives System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:26:06.323Z

Reserved: 2026-02-18T13:36:29.062Z

Link: CVE-2026-2683

cve-icon Vulnrichment

Updated: 2026-02-19T16:44:25.968Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T23:16:21.290

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses