Description
A vulnerability was found in Dromara UJCMS 10.0.2. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results in injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-22
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via parameter injection
Action: Immediate Patch
AI Analysis

Impact

The flaw occurs in the importChanel function of the ImportDataController in Dromara UJCMS 10.0.2. By manipulating the driverClassName and url arguments, an attacker can inject payloads, which may allow execution of arbitrary code or manipulation of data. This is a classic input injection defect identified by CWE-74 and CWE-707, illustrating unsafe handling of external input.

Affected Systems

Dromara UJCMS 10.0.2 is affected. The vulnerability pertains to the /api/backend/ext/import-data/import-channel endpoint. No other vendor or product versions are listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity. EPSS is less than 1%, showing a low current probability of exploitation, yet the exploit has been made public and can be used remotely. The vulnerability is not listed in the CISA KEV catalog. Attackers can reach the vulnerable endpoint over the network, providing crafted driverClassName and url parameters to trigger the injection. Depending on the underlying implementation, this could result in unauthorized code execution or data tampering.

Generated by OpenCVE AI on April 18, 2026 at 11:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest available UJCMS release that includes the fix for the importChanel injection flaw.
  • If an update is not available, limit access to the /api/backend/ext/import-data/import-channel endpoint to authorized administrators only, using firewall ACLs or authentication controls.
  • Validate and sanitize the driverClassName and url parameters so that only expected values are accepted, thereby preventing injection payloads.

Generated by OpenCVE AI on April 18, 2026 at 11:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 18:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ujcms:ujcms:10.0.2:*:*:*:*:*:*:*

Tue, 24 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 22 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Dromara UJCMS 10.0.2. Impacted is the function importChanel of the file /api/backend/ext/import-data/import-channel of the component ImportDataController. Performing a manipulation of the argument driverClassName/url results in injection. It is possible to initiate the attack remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Dromara UJCMS ImportDataController import-channel importChanel injection
First Time appeared Ujcms
Ujcms ujcms
Weaknesses CWE-707
CWE-74
CPEs cpe:2.3:a:ujcms:ujcms:*:*:*:*:*:*:*:*
Vendors & Products Ujcms
Ujcms ujcms
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T19:02:26.819Z

Reserved: 2026-02-21T21:11:15.185Z

Link: CVE-2026-2954

cve-icon Vulnrichment

Updated: 2026-02-23T19:02:20.928Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-22T15:16:16.610

Modified: 2026-02-25T17:45:50.820

Link: CVE-2026-2954

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:15:35Z

Weaknesses