Description
A security vulnerability has been detected in perfree go-fastdfs-web up to 1.3.7. This affects an unknown part of the file src/main/java/com/perfree/controller/InstallController.java of the component doInstall Interface. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-11
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

An improper authorization flaw exists in the InstallController component of perfree’s go-fastdfs-web, affecting versions up to 1.3.7. The bug allows an attacker to bypass access controls, potentially executing privileged operations or accessing sensitive data without proper authentication. This weakness aligns with common vulnerability identifiers CWE‑266 and CWE‑285, which represent inadequate permission enforcement and unauthorized privilege escalation.

Affected Systems

The vulnerable product is perfree:go-fastdfs-web, specifically every release up to version 1.3.7. The flaw is located in src/main/java/com/perfree/controller/InstallController.java within the doInstall interface, and no later versions have been documented as affected.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity, and the vulnerability is not listed in the KEV catalog. No EPSS data are available, but the description states the exploit has been publicly disclosed and may be used. It is inferred that the attack vector is remote, allowing external actors to trigger the vulnerability by accessing the InstallController endpoint. Given these factors, the risk remains moderate to high until a vendor patch or equivalent mitigation is applied.

Generated by OpenCVE AI on April 11, 2026 at 23:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply any vendor‑proposed patch or upgrade to a non‑vulnerable release of go-fastdfs-web.
  • Confirm that the InstallController enforces proper authorization checks before performing privileged actions.
  • If a patch is unavailable, isolate the affected service, limit network exposure to the InstallController endpoint, and monitor for suspicious activity.
  • Contact the vendor for official guidance and stay alert for future advisories.

Generated by OpenCVE AI on April 11, 2026 at 23:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Perfree
Perfree go-fastdfs-web
Vendors & Products Perfree
Perfree go-fastdfs-web

Sat, 11 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in perfree go-fastdfs-web up to 1.3.7. This affects an unknown part of the file src/main/java/com/perfree/controller/InstallController.java of the component doInstall Interface. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title perfree go-fastdfs-web doInstall InstallController.java improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Perfree Go-fastdfs-web
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-13T17:41:44.218Z

Reserved: 2026-04-11T07:14:44.771Z

Link: CVE-2026-6105

cve-icon Vulnrichment

Updated: 2026-04-13T17:41:40.501Z

cve-icon NVD

Status : Deferred

Published: 2026-04-11T22:16:01.417

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-6105

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:56:31Z

Weaknesses