Vulnerability Description
A security vulnerability has been detected in zyx0814 FilePress up to 2.2.0. Affected by this vulnerability is an unknown functionality of the file dzz/shares/admin.php of the component Shares Filelist API. Such manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The name of the patch is e20ec58414103f781858f2951d178e19b1736664. A patch should be applied to remediate this issue.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/xiaohaiyang-ai/Web-Security-Research/tree/main/FilePress/Shar
- https://github.com/zyx0814/FilePress/
- https://github.com/zyx0814/FilePress/commit/e20ec58414103f781858f2951d178e19b173
- https://github.com/zyx0814/FilePress/issues/70
- https://github.com/zyx0814/FilePress/pull/71
- https://vuldb.com/submit/808819
- https://vuldb.com/vuln/361923
- https://vuldb.com/vuln/361923/cti
FAQ
What is CVE-2026-8133?
CVE-2026-8133 is a vulnerability with a CVSS score of 7.3 (HIGH). A security vulnerability has been detected in zyx0814 FilePress up to 2.2.0. Affected by this vulnerability is an unknown functionality of the file dzz/shares/admin.php of the component Shares Filelis...
How severe is CVE-2026-8133?
CVE-2026-8133 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-8133?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.