Description
A vulnerability was identified in Shandong Hoteam InforCenter PLM up to 8.3.8. The impacted element is the function uploadFileToIIS of the file /Base/BaseHandler.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-01
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted File Upload
Action: Apply Patch
AI Analysis

Impact

The vulnerability is located in the uploadFileToIIS routine of the BaseHandler.ashx endpoint used by Shandong Hoteam InforCenter PLM. Manipulating the File parameter allows an attacker to upload any file, regardless of type, to the web server. This can expose sensitive data or place malicious payloads in a location accessible to web clients, creating a potential vector for further compromise. The flaw permits remote attackers to initiate the upload through standard HTTP requests, and public exploit code is available.

Affected Systems

All installations of Shandong Hoteam InforCenter PLM with versions up to and including 8.3.8 are affected. The BaseHandler.ashx upload endpoint is the entry point for the problem.

Risk and Exploitability

The reported severity rating is moderate to high. A publicly available exploit indicates that the attack can be performed remotely by sending a crafted request. Although no detailed exploit probability score is published, the combination of a moderate severity score and an available exploit suggests a realistic threat. The vulnerability is not listed in any known exploited catalog, but the ability to upload arbitrary files remains a serious risk to confidentiality, integrity, and availability of the affected systems.

Generated by OpenCVE AI on April 1, 2026 at 10:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update or upgrade to a version newer than 8.3.8 provided by the vendor.
  • If no patch is available, restrict the uploadFileToIIS endpoint to accept only whitelisted file types or disable the upload functionality entirely.
  • Configure the IIS installation to place uploaded files in a non-executable directory and deny script execution there.
  • Monitor upload logs for suspicious activity and enforce strict access controls to the upload directory.

Generated by OpenCVE AI on April 1, 2026 at 10:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Shandong Hoteam
Shandong Hoteam inforcenter Plm
Vendors & Products Shandong Hoteam
Shandong Hoteam inforcenter Plm

Wed, 01 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Shandong Hoteam InforCenter PLM up to 8.3.8. The impacted element is the function uploadFileToIIS of the file /Base/BaseHandler.ashx. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Shandong Hoteam InforCenter PLM BaseHandler.ashx uploadFileToIIS unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Shandong Hoteam Inforcenter Plm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T19:45:57.078Z

Reserved: 2026-03-31T16:25:46.805Z

Link: CVE-2026-5261

cve-icon Vulnrichment

Updated: 2026-04-03T19:45:52.462Z

cve-icon NVD

Status : Deferred

Published: 2026-04-01T09:16:17.920

Modified: 2026-04-24T18:12:06.580

Link: CVE-2026-5261

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:59Z

Weaknesses