Description
In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerability exists in RadAsyncUpload, where a predictable temporary identifier, based on timestamp and filename, can enable collisions and file content tampering.
Published: 2026-02-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential file content tampering due to predictable temporary identifiers
Action: Apply Patch
AI Analysis

Impact

The issue resides in the RadAsyncUpload component of Progress Software’s Telerik UI for ASP.NET AJAX. Prior to version 2026.1.225 the component generates a temporary file identifier that is only based on the current timestamp and the original filename. This lack of entropy allows an attacker to cause hash collisions, thereby enabling manipulation of the file contents stored on the server. The weakness is a classic example of insufficient entropy (CWE‑331), resulting in a medium severity vulnerability (CVSS 5.3) that could compromise integrity of uploaded files. The CVSS score reflects moderate impact, but the exploitation probability is low (EPSS < 1%).

Affected Systems

This vulnerability affects installations of Progress Software’s Telerik UI for ASP.NET AJAX, specifically all versions earlier than 2026.1.225. Users of legacy versions should review their deployment to confirm whether RadAsyncUpload is used for handling file uploads.

Risk and Exploitability

Exploit requires an attacker’s ability to upload a file through the RadAsyncUpload control. By manipulating the predictable temporary identifier, the attacker may force a collision and replace or modify the content of an existing upload. The likely attack vector is through the RadAsyncUpload component when a file upload operation is performed. Based on the description, it is inferred that the upload interface might be publicly exposed, allowing remote exploitation. The vulnerability can be leveraged locally or remotely if the upload interface is publicly exposed. Given the low EPSS score and absence from the KEV catalog, the current threat level remains medium but warrants remediation before an exploit surfaces.

Generated by OpenCVE AI on April 17, 2026 at 15:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Telerik UI for ASP.NET AJAX to version 2026.1.225 or later to eliminate the entropy flaw.
  • If upgrading is not immediately possible, disable or remove the RadAsyncUpload component from your application to prevent use of the vulnerable code path.
  • For custom upload handling, ensure that temporary filenames incorporate high‑entropy values—such as a random UUID or a cryptographic hash—to prevent collisions and maintain file integrity.

Generated by OpenCVE AI on April 17, 2026 at 15:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:progress:telerik_ui_for_asp.net_ajax:*:*:*:*:*:*:*:*

Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Progress
Progress telerik Ui For Asp.net Ajax
Vendors & Products Progress
Progress telerik Ui For Asp.net Ajax

Wed, 25 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description In Progress® Telerik® UI for AJAX, versions prior to 2026.1.225, an insufficient entropy vulnerability exists in RadAsyncUpload, where a predictable temporary identifier, based on timestamp and filename, can enable collisions and file content tampering.
Title Insufficient Entropy Vulnerability in Telerik UI for ASP.NET AJAX
Weaknesses CWE-331
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N'}


Subscriptions

Progress Telerik Ui For Asp.net Ajax
cve-icon MITRE

Status: PUBLISHED

Assigner: ProgressSoftware

Published:

Updated: 2026-02-27T17:06:16.616Z

Reserved: 2026-02-20T16:20:51.770Z

Link: CVE-2026-2878

cve-icon Vulnrichment

Updated: 2026-02-27T17:06:13.052Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T15:20:54.293

Modified: 2026-02-26T15:23:31.757

Link: CVE-2026-2878

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T15:30:06Z

Weaknesses