Description
xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue.
Published: 2026-03-18
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Apply Patch
AI Analysis

Impact

The vulnerability allows an administrator to upload a ZIP file containing a binary and a manifest.json. The server trusts the binaries field in the manifest and executes the specified file without validating its contents or behavior, enabling an attacker to run arbitrary code on the host. This flaw effectively grants remote code execution on the underlying system, allowing a malicious actor to execute commands, tamper with data, and potentially compromise the entire self‑hosted financial platform. The weakness is a classic example of unrestricted file upload and command injection, reflected in CWE‑434 and CWE‑78, and poses a severe threat to confidentiality, integrity and availability of the affected system.

Affected Systems

The affected product is danvei233’s xiaoheiFS, a self‑hosted financial and operational system used by cloud service providers. Versions up to and including 0.3.15 are vulnerable; the issue is resolved in version 0.4.0 and later. Administrators who can upload plugins to the xiaoheiFS instance are at risk. Users of any earlier releases should immediately plan an upgrade.

Risk and Exploitability

The CVSS score of 7.2 indicates a high severity impact. The EPSS score of less than 1% suggests the likelihood of exploitation is currently low, and the vulnerability is not listed in the CISA KEV catalog. However, exploitation requires administrative access to upload a malicious plugin, meaning attackers must first compromise or have legitimate access to the system. Once authenticated, they can deploy arbitrary binaries and achieve full control of the host. Given the high severity, moderate exploitation probability, and privileged attacker requirement, organizations running affected versions should treat this as a significant risk and act promptly.

Generated by OpenCVE AI on March 23, 2026 at 19:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade xiaoheiFS to version 0.4.0 or later, which removes the insecure plugin handling logic.
  • If an upgrade is not immediately possible, restrict the plugin upload feature to trusted administrators and consider disabling it until a patch can be applied.
  • Monitor the system for anomalous plugin upload activity or unexpected process execution to detect potential exploitation attempts.

Generated by OpenCVE AI on March 23, 2026 at 19:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:danvei233:xiaoheifs:*:*:*:*:*:*:*:*

Wed, 18 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Danvei233
Danvei233 xiaoheifs
Vendors & Products Danvei233
Danvei233 xiaoheifs

Wed, 18 Mar 2026 01:00:00 +0000

Type Values Removed Values Added
Description xiaoheiFS is a self-hosted financial and operational system for cloud service businesses. In versions up to and including 0.3.15, the standard plugin system allows admins to upload a ZIP file containing a binary and a `manifest.json`. The server trusts the `binaries` field in the manifest and executes the specified file without any validation of its contents or behavior, leading to Remote Code Execution (RCE). Version 0.4.0 fixes the issue.
Title xiaoheiFS Vulnerable to RCE via Unrestricted Plugin Installation (Manifest Manipulation)
Weaknesses CWE-434
CWE-78
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Danvei233 Xiaoheifs
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-18T14:34:38.632Z

Reserved: 2026-03-02T21:43:19.926Z

Link: CVE-2026-28673

cve-icon Vulnrichment

Updated: 2026-03-18T14:34:28.838Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-18T01:16:05.117

Modified: 2026-03-23T17:58:19.487

Link: CVE-2026-28673

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:53:52Z

Weaknesses