Description
A weakness has been identified in Sanluan PublicCMS 6.202506.d. This impacts the function saveMetadata of the file TemplateCacheComponent.java of the component Template Cache Generation. Executing a manipulation can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path Traversal
Action: Patch Now
AI Analysis

Impact

Sanluan PublicCMS 6.202506.d contains a path‑traversal weakness located in the saveMetadata method of TemplateCacheComponent.java within the Template Cache Generation component. The flaw allows an attacker to construct input that resolves filesystem paths outside the intended cache directory, potentially enabling unauthorized access to sensitive files or arbitrary file writes. The vulnerability is triggered by remote requests and is already exploited through publicly available code, exposing the system to significant confidentiality and integrity risks.

Affected Systems

Sanluan PublicCMS 6.202506.d is affected. The vulnerability arises in the Template Cache Generation component's TemplateCacheComponent.java file. All installations of this specific version that expose the saveMetadata functionality are vulnerable. The component is part of the standard PublicCMS distribution, so any instance running 6.202506.d inherits the flaw.

Risk and Exploitability

This issue has a CVSS score of 5.3, indicating moderate severity. Its EPSS score is below 1 %, suggesting that exploit attempts are currently infrequent, and it is not listed in CISA’s KEV catalog. However, publicly available code demonstrates the vulnerability can be triggered via remote requests, enabling attackers to construct input that resolves to paths outside the intended cache directory. If successful, an attacker could read arbitrary files or write malicious content, compromising confidentiality, integrity, or availability of the server.

Generated by OpenCVE AI on April 18, 2026 at 17:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑supplied patch or update that addresses the path‑traversal flaw.
  • If no patch exists, isolate or restrict the saveMetadata endpoint by firewall rules, limiting it to trusted IP ranges or removing the endpoint from the production environment.
  • Enforce strict directory permissions so that the CMS processes run with only the minimal necessary write and read rights, preventing traversal writes from affecting critical system areas.

Generated by OpenCVE AI on April 18, 2026 at 17:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:publiccms:publiccms:6.202506.d:*:*:*:*:*:*:*

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 04:45:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Sanluan PublicCMS 6.202506.d. This impacts the function saveMetadata of the file TemplateCacheComponent.java of the component Template Cache Generation. Executing a manipulation can lead to path traversal. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Sanluan PublicCMS Template Cache Generation TemplateCacheComponent.java saveMetadata path traversal
First Time appeared Publiccms
Publiccms publiccms
Weaknesses CWE-22
CPEs cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:*
Vendors & Products Publiccms
Publiccms publiccms
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Publiccms Publiccms
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T18:48:46.975Z

Reserved: 2026-02-26T16:56:55.155Z

Link: CVE-2026-3289

cve-icon Vulnrichment

Updated: 2026-02-27T18:48:43.295Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-27T05:18:21.613

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3289

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:45:06Z

Weaknesses