Description
A vulnerability was found in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0. This impacts an unknown function of the file /SubstationWEBV2/main/uploadH5Files. The manipulation of the argument File results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-03
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is present in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0, affecting the /SubstationWEBV2/main/uploadH5Files endpoint. By manipulating the File argument, an attacker can upload arbitrary files without restrictions. This flaw represents a classic unchecked upload weakness (CWE‑434) combined with improper access control (CWE‑284), enabling potential remote code execution or unauthorized file placement on the server. Based on the description, it is inferred that the flaw can be triggered by sending specially crafted requests to the upload endpoint.

Affected Systems

The affected product is Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform version 1.3.0. No other versions are listed, and the CVE references only identify this specific release. Based on the vendor information, it is inferred that other versions are not affected unless they contain the same upload implementation.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate impact. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The description states that the attack may be launched remotely, and the exploit has been made public, implying that an attacker could exploit this flaw from any network without needing credentials. Because file uploads are typically accessible by authenticated or even unauthenticated users, the risk of exploitation remains significant for systems with exposed endpoints. Based on the description, it is inferred that the risk applies to any system running the affected version with a publicly accessible upload endpoint.

Generated by OpenCVE AI on May 3, 2026 at 13:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify whether a vendor patch or update is available for version 1.3.0 and deploy it immediately
  • If no patch exists, restrict the /SubstationWEBV2/main/uploadH5Files endpoint to authenticated users only and enforce multi‑factor authentication for privileged access
  • Implement strict file type and size validation on the server side, including MIME type checks and extension whitelisting

Generated by OpenCVE AI on May 3, 2026 at 13:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sun, 03 May 2026 12:45:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform 1.3.0. This impacts an unknown function of the file /SubstationWEBV2/main/uploadH5Files. The manipulation of the argument File results in unrestricted upload. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Acrel Electrical EEMS Enterprise Power Operation and Maintenance Cloud Platform uploadH5Files unrestricted upload
Weaknesses CWE-284
CWE-434
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-03T12:30:38.217Z

Reserved: 2026-05-02T19:38:07.051Z

Link: CVE-2026-7696

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-03T13:16:09.010

Modified: 2026-05-03T13:16:09.010

Link: CVE-2026-7696

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-03T14:00:17Z

Weaknesses