Description
A vulnerability was found in SonicCloudOrg sonic-server up to 2.0.0. The affected element is the function Upload of the file FileTool.java of the component File Upload Endpoint. The manipulation of the argument Type results in path traversal. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Path Traversal via File Upload
Action: Apply Patch
AI Analysis

Impact

A path traversal flaw exists in the Upload function of FileTool.java in SonicCloudOrg sonic-server. By manipulating the Type argument in the file upload request the adversary can cause the server to write files to arbitrary paths. The consequence is that an attacker could overwrite critical configuration files or store malicious code, thereby exposing the system to further compromise or data exfiltration. The vulnerability is reported as remotely exploitable and a public proof‑of‑concept already exists.

Affected Systems

The flaw is present in SonicCloudOrg sonic-server versions up to and including 2.0.0. No later releases are referenced in the advisory.

Risk and Exploitability

The CVSS score of 5.3 places the vulnerability in the medium severity band. EPSS is not available and the flaw is not listed in the CISA KEV catalog. Because the attack vector is remote and a public exploit is available, the risk to environments running the affected version is considered moderate to high pending patch or mitigation.

Generated by OpenCVE AI on April 20, 2026 at 09:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SonicCloudOrg sonic-server to a version that contains the path‑traversal fix when it becomes available.
  • Validate and sanitize the Type parameter server‑side to allow only expected characters and disallow the use of directory traversal sequences before handling the upload.
  • If the upload feature is not required, disable the upload endpoint or restrict it to a trusted internal network segment.

Generated by OpenCVE AI on April 20, 2026 at 09:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Soniccloudorg
Soniccloudorg sonic-server
Vendors & Products Soniccloudorg
Soniccloudorg sonic-server

Mon, 20 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in SonicCloudOrg sonic-server up to 2.0.0. The affected element is the function Upload of the file FileTool.java of the component File Upload Endpoint. The manipulation of the argument Type results in path traversal. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title SonicCloudOrg sonic-server File Upload Endpoint FileTool.java upload path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Soniccloudorg Sonic-server
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T15:35:54.833Z

Reserved: 2026-04-19T16:21:58.957Z

Link: CVE-2026-6620

cve-icon Vulnrichment

Updated: 2026-04-20T15:35:46.241Z

cve-icon NVD

Status : Received

Published: 2026-04-20T09:16:09.990

Modified: 2026-04-20T09:16:09.990

Link: CVE-2026-6620

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:58:00Z

Weaknesses