Vulnerability Description
A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the argument messageId results in authorization bypass. The attack can be launched remotely. The exploit has been made public and could be used. Upgrading to version 1.3.3-beta is able to address this issue. The patch is identified as aefaabfd7527188bfba3c8c9eee17c316d094802. The affected component should be upgraded. The project was informed beforehand and acted very professional: "We have implemented message ownership verification, so that users can only query messages related to themselves."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Szadmin | Sz-Boot-Parent | <= 0.9.0 |
Related Weaknesses (CWE)
References
- https://github.com/feiyuchuixue/sz-boot-parent/Product
- https://github.com/feiyuchuixue/sz-boot-parent/commit/aefaabfd7527188bfba3c8c9eePatch
- https://github.com/feiyuchuixue/sz-boot-parent/releases/tag/v1.3.3-betaRelease Notes
- https://github.com/yuccun/CVE/blob/main/sz-boot-parent-IDOR_Message_ID_EnumeratiExploitThird Party Advisory
- https://vuldb.com/?ctiid.347743Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.347743Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.754036Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-3185?
CVE-2026-3185 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability was found in feiyuchuixue sz-boot-parent up to 1.3.2-beta. Affected is an unknown function of the file /api/admin/sys-message/ of the component API Endpoint. The manipulation of the ar...
How severe is CVE-2026-3185?
CVE-2026-3185 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3185?
Check the references section above for vendor advisories and patch information. Affected products include: Szadmin Sz-Boot-Parent.