Description
A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. This issue affects the function uploadFile of the file /server/utils/upload.js of the component isImg Check. The manipulation of the argument fileType leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-28
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote File Upload
Action: Assess Impact
AI Analysis

Impact

A vulnerability exists in the uploadFile function of the z-9527 admin component, specifically within the isImg Check module located at /server/utils/upload.js. The flaw arises from improper handling of the fileType argument, allowing an attacker to perform a path traversal attack that can lead to arbitrary file writes on the server. Remote exploitation is possible, which could enable the attacker to upload malicious files or overwrite critical configuration files, potentially resulting in unauthorized code execution or persistence on the affected system.

Affected Systems

The affected product is z-9527 admin, with affected versions up to the commit hash 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. Because the vendor follows a rolling release model, no specific version numbers are published for patched or unpatched releases. Systems running any iteration of the component before the fix defined by that commit are considered vulnerable. The vendor has not responded to notification.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and although EPSS data is unavailable, the vulnerability has been publicly disclosed and could be exploited remotely via the file upload endpoint without requiring authentication. The lack of a known patch and vendor inaction increase the risk of exploitation in the wild. As the vulnerability permits path traversal, an attacker could write files to arbitrary locations, which may lead to data compromise, configuration tampering, or execution of malicious code if the server subsequently processes those files.

Generated by OpenCVE AI on March 28, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the presence of the vulnerable upload endpoint by testing the fileType parameter for path traversal responses.
  • If the system is found vulnerable, isolate it from external networks until a fix is applied.
  • Apply any vendor-released patch or upgrade to a newer release that is newer than commit 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2.
  • If a patch or upgrade is not available, disable the file upload feature or remove the isImg Check component entirely.
  • Continue monitoring application logs for repeated upload attempts and known path traversal patterns.
  • Persistently contact the vendor to obtain an official fix and follow their guidance.

Generated by OpenCVE AI on March 28, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Z-9527
Z-9527 admin
Vendors & Products Z-9527
Z-9527 admin

Sat, 28 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in z-9527 admin up to 72aaf2dd05cf4ec2e98f390668b41e128eec5ad2. This issue affects the function uploadFile of the file /server/utils/upload.js of the component isImg Check. The manipulation of the argument fileType leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way.
Title z-9527 admin isImg Check upload.js uploadFile path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-30T17:11:58.812Z

Reserved: 2026-03-27T13:48:18.056Z

Link: CVE-2026-4999

cve-icon Vulnrichment

Updated: 2026-03-30T17:11:52.064Z

cve-icon NVD

Status : Deferred

Published: 2026-03-28T15:16:38.330

Modified: 2026-04-24T16:36:24.067

Link: CVE-2026-4999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:59:03Z

Weaknesses