Metrics
Affected Vendors & Products
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Huanzi-qch
Huanzi-qch base-admin |
|
| Vendors & Products |
Huanzi-qch
Huanzi-qch base-admin |
Wed, 18 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 18 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | huanzi-qch base-admin JSP Parser SysFileController.java upload unrestricted upload | |
| Weaknesses | CWE-284 CWE-434 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2026-02-18T20:02:07.555Z
Updated: 2026-02-18T20:37:34.134Z
Reserved: 2026-02-18T08:56:57.505Z
Link: CVE-2026-2665
Updated: 2026-02-18T20:37:25.783Z
Status : Awaiting Analysis
Published: 2026-02-18T20:18:37.110
Modified: 2026-02-19T15:53:02.850
Link: CVE-2026-2665
No data.