Description
An arbitrary file upload vulnerability in the ShopOrderImportController.java component of qihang-wms commit 75c15a allows attackers to execute arbitrary code via uploading a crafted file.
Published: 2026-05-13
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability arises from an arbitrary file upload flaw in the ShopOrderImportController component, allowing attackers to craft a file that is executed on the server. This flaw directly enables remote code execution, granting attackers full control over the affected system. The weakness corresponds to poor handling of uploaded file types and is identified as CWE-434.

Affected Systems

The flaw is present in the qihang-wms application, specifically in the commit identified as 75c15a. Because no vendor or product version information is supplied, the affected product is limited to this code base and its deployment environments. Users running this unpatched application are potentially exposed.

Risk and Exploitability

Exploitability is high since the flaw is triggered simply by submitting a malicious upload through the exposed endpoint. The CVSS score of 7.3 indicates a high severity, and the lack of validation and the direct execution path make it a priority target for attackers who can reach the upload interface over the network. The EPSS score is < 1%, indicating a low exploitation probability, and the vulnerability is not listed in the CISA KEV catalog.

Generated by OpenCVE AI on May 14, 2026 at 22:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the qihang-wms codebase to a version that removes or patches the vulnerable ShopOrderImportController logic.
  • Implement strict file type validation by whitelisting allowed extensions and MIME types before saving any uploaded content.
  • Store uploaded files outside the web‑accessible directory and rename them to unique identifiers to prevent direct execution.

Generated by OpenCVE AI on May 14, 2026 at 22:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 14 May 2026 23:00:00 +0000

Type Values Removed Values Added
Title Arbitrary File Upload Allows Remote Code Execution in qihang-wms

Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-434
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description An arbitrary file upload vulnerability in the ShopOrderImportController.java component of qihang-wms commit 75c15a allows attackers to execute arbitrary code via uploading a crafted file.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-14T19:29:17.212Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-37430

cve-icon Vulnrichment

Updated: 2026-05-14T19:21:37.244Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T14:17:32.453

Modified: 2026-05-14T20:17:03.917

Link: CVE-2026-37430

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-14T22:45:31Z

Weaknesses