Description
A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTarGZ/extractZip of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/CommandUtils.java of the component Archive Extraction. The manipulation leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal
Action: Investigate
AI Analysis

Impact

The vulnerability resides in the extractTarGZ and extractZip functions of the CommandUtils class in HummerRisk's archive extraction component. By manipulating the path entries inside a submitted archive, an attacker can cause the application to extract files outside the intended directory, resulting in unauthorized file system access. The impact is the ability to read or write arbitrary files on the host, compromising confidentiality, integrity, or availability of the system.

Affected Systems

All instances of HummerRisk up to and including version 1.5.0 are affected. The flaw is located in the hummer-common-core module of the application and applies to the Archive Extraction functionality exposed by the web service.

Risk and Exploitability

The CVSS score is 5.3, indicating moderate severity, and the EPSS score is less than 1%, suggesting a low probability of exploitation at present. This vulnerability is not listed in the CISA KEV catalog. Exploitation requires remote delivery of a crafted archive to the extraction endpoint, which can be performed over the network if the service is exposed. The lack of a public patch from the vendor further increases the risk for existing deployments.

Generated by OpenCVE AI on April 17, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade HummerRisk to a version in which the extractZip and extractTarGZ functions have been fixed.
  • Limit external exposure of the archive extraction endpoint to trusted hosts or protect it behind a firewall or VPN.
  • Validate the paths of entries in uploaded archives on the server side, ensuring they resolve within the intended extraction directory and rejecting or sanitizing any relative or absolute paths that attempt to escape it.

Generated by OpenCVE AI on April 17, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hummerrisk:hummerrisk:*:*:*:*:*:*:*:*

Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hummerrisk
Hummerrisk hummerrisk
Vendors & Products Hummerrisk
Hummerrisk hummerrisk

Tue, 24 Feb 2026 04:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in HummerRisk up to 1.5.0. This issue affects the function extractTarGZ/extractZip of the file hummer-common/hummer-common-core/src/main/java/com/hummer/common/core/utils/CommandUtils.java of the component Archive Extraction. The manipulation leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title HummerRisk Archive Extraction CommandUtils.java extractZip path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Hummerrisk Hummerrisk
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-24T18:47:21.803Z

Reserved: 2026-02-23T18:51:08.121Z

Link: CVE-2026-3067

cve-icon Vulnrichment

Updated: 2026-02-24T18:47:14.500Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T04:15:59.210

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3067

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses