Description
A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This affects the function Upload of the file chat2db-server/chat2db-server-web/chat2db-server-web-api/src/main/java/ai/chat2db/server/web/api/controller/driver/JdbcDriverController.java of the component JDBC Driver Upload. Performing a manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Arbitrary File Upload leading to potential code execution
Action: Immediate Patch
AI Analysis

Impact

A flaw in the JDBC Driver Upload component allows an attacker to upload any file to the server without restriction, violating proper authentication and authorization controls. This type of unrestricted upload can expose the system to arbitrary code execution or other malicious operations if executable files are uploaded and later executed.

Affected Systems

Software affected is CodePhiliaX Chat2DB, with vulnerable releases up to version 0.3.7. No subsequent releases are documented as safe in the provided data.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. Exploit potential is confirmed as public, and the vulnerability can be triggered over the network, i.e., remotely. Since EPSS data is unavailable and the issue is not in the KEV catalog, the overall threat is considered moderate but actionable due to the ease of remote exploitation.

Generated by OpenCVE AI on March 23, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest vendor patch or update to a release newer than 0.3.7 if available.
  • If no patch exists, disable the JDBC driver upload endpoint until remediation is applied.
  • Implement strict file type and size validation on the server side to reject disallowed uploads.
  • Ensure uploaded files are stored in non-executable directories and execute file checks.
  • Monitor application and server logs for anomalous upload activity and investigate suspected incidents.

Generated by OpenCVE AI on March 23, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Codephiliax
Codephiliax chat2db
Vendors & Products Codephiliax
Codephiliax chat2db

Mon, 23 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This affects the function Upload of the file chat2db-server/chat2db-server-web/chat2db-server-web-api/src/main/java/ai/chat2db/server/web/api/controller/driver/JdbcDriverController.java of the component JDBC Driver Upload. Performing a manipulation results in unrestricted upload. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title CodePhiliaX Chat2DB JDBC Driver Upload JdbcDriverController.java upload unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codephiliax Chat2db
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-23T16:00:39.682Z

Reserved: 2026-03-22T09:37:11.395Z

Link: CVE-2026-4586

cve-icon Vulnrichment

Updated: 2026-03-23T16:00:35.762Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-23T13:16:31.103

Modified: 2026-03-23T14:31:37.267

Link: CVE-2026-4586

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:49:14Z

Weaknesses