Vulnerability Description
A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/huanzi-qch/base-admin/
- https://github.com/huanzi-qch/base-admin/issues/38
- https://github.com/huanzi-qch/base-admin/issues/38#issue-3905100373
- https://vuldb.com/?ctiid.346462
- https://vuldb.com/?id.346462
- https://vuldb.com/?submit.753240
FAQ
What is CVE-2026-2665?
CVE-2026-2665 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Pe...
How severe is CVE-2026-2665?
CVE-2026-2665 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2665?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.