Vulnerability Description
An issue in the fileEntityId parameter in the /a/file/upload endpoint of JeeSite v5.15.1 allows authenticated attackers with file upload permissions to execute a path traversal and write arbitrary files with whitelisted suffixes to arbitrary filesystem locations.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/thinkgem/jeesite
- https://github.com/thinkgem/jeesite/issues/529
- https://github.com/thinkgem/jeesite/issues/529
FAQ
What is CVE-2026-36762?
CVE-2026-36762 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue in the fileEntityId parameter in the /a/file/upload endpoint of JeeSite v5.15.1 allows authenticated attackers with file upload permissions to execute a path traversal and write arbitrary fil...
How severe is CVE-2026-36762?
CVE-2026-36762 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-36762?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.