Vulnerability Description
A vulnerability was determined in SSCMS up to 7.4.0. This vulnerability affects the function PathUtils.RemoveParentPath of the file /api/admin/plugins/install/actions/download. This manipulation of the argument path causes path traversal. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://vuldb.com/?ctiid.351146
- https://vuldb.com/?id.351146
- https://vuldb.com/?submit.770536
- https://www.yuque.com/la12138/pa2fpb/mbcvbk402bx1qbft?singleDoc
FAQ
What is CVE-2026-4222?
CVE-2026-4222 is a vulnerability with a CVSS score of 3.8 (LOW). A vulnerability was determined in SSCMS up to 7.4.0. This vulnerability affects the function PathUtils.RemoveParentPath of the file /api/admin/plugins/install/actions/download. This manipulation of th...
How severe is CVE-2026-4222?
CVE-2026-4222 has been rated LOW with a CVSS base score of 3.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4222?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.